7.8
CVSSv3

CVE-2016-2494

Published: 13/06/2016 Updated: 30/11/2016
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Off-by-one error in sdcard/sdcard.c in Android 4.x prior to 4.4.4, 5.0.x prior to 5.0.2, 5.1.x prior to 5.1.1, and 6.x prior to 2016-06-01 allows malicious users to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 28085658.

Vulnerable Product Search on Vulmon Subscribe to Product

google android 5.0

google android 4.4.3

google android 4.2.1

google android 4.2

google android 4.1.2

google android 5.1

google android 5.0.1

google android 4.3

google android 4.2.2

google android 4.0.1

google android 4.0

google android 6.0.1

google android 4.4.2

google android 4.4.1

google android 4.1

google android 4.0.4

google android 6.0

google android 5.1.0

google android 4.4

google android 4.3.1

google android 4.0.3

google android 4.0.2

Exploits

Source: bugschromiumorg/p/project-zero/issues/detail?id=798 Android: Stack-buffer-overflow in /system/bin/sdcard There's an integer overflow issue in get_node_path_locked, which results in a buffer overflow For all of the calling paths, this is going to overflow a stack buffer in the parent function: static ssize_t get_node_path_loc ...