7.2
CVSSv2

CVE-2016-0805

Published: 07/02/2016 Updated: 11/03/2016
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.4 | Impact Score: 5.9 | Exploitability Score: 2.5
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The performance event manager for Qualcomm ARM processors in Android 4.x prior to 4.4.4, 5.x prior to 5.1.1 LMY49G, and 6.x prior to 2016-02-01 allows malicious users to gain privileges via a crafted application, aka internal bug 25773204.

Vulnerable Product Search on Vulmon Subscribe to Product

google android 5.0.2

google android 5.0

google android 4.2.2

google android 4.2

google android 6.0.1

google android 6.0

google android 5.1.1

google android 5.1.0

google android 5.1

google android 4.1.2

google android 4.1

google android 4.0.4

google android 4.0.3

google android 4.4.2

google android 4.4.1

google android 4.4

google android 4.3.1

google android 4.0.2

google android 4.0

google android 5.0.1

google android 4.4.3

google android 4.3

google android 4.2.1

google android 4.0.1

Recent Articles

Your unpatchable, insecure Android mobe will feel right at home in the Internet of Stuff era
The Register • Iain Thomson in San Francisco • 16 Mar 2016

Qualcomm's broken kernel code is the tip of the iceberg

If you've got a Qualcomm Snapdragon chip in your Android phone and tablet, make sure you grab its latest security updates – if you can. And if you can't, well, get used to it: the Internet of Things is going to bring more and more un-patchable and insecure electronics onto the market, it's feared. Researchers at Trend Micro have discovered severe programming blunders in Qualcomm's kernel-level Snapdragon code that can be exploited by a bad app to root the device. In other words, code installed...