890
VMScore

CVE-2019-2205

Published: 13/11/2019 Updated: 21/07/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In ProxyResolverV8::SetPacScript of proxy_resolver_v8.cc, there is a possible memory corruption due to a use after free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-139806216

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android 8.0

google android 8.1

google android 9.0

google android 10.0

Github Repositories

A local PoC exploit for CVE-2019-2205

PACPoC: A local PoC exploit for CVE-2019-2205 To try out this exploit install the "malicious" app PacTestapk and make exploitpac available over http with, for example python -m SimpleHTTPServer Then go to proxy settings on an Android device, select proxy autoconfig, and enter the URL to exploitpac