9.3

CVE-2011-3874

Stack-based buffer overflow in libsysutils in Android 2.2.x through 2.2.2 and 2.3.x through 2.3.6 allows user-assisted remote attackers to execute arbitrary code via an application that calls the FrameworkListener::dispatchCommand method with the wrong number of arguments, as demonstrated by zergRush to trigger a use-after-free error.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GoogleAndroid Version2.2
GoogleAndroid Version2.2 Updaterev1
GoogleAndroid Version2.2.1
GoogleAndroid Version2.2.2
GoogleAndroid Version2.3
GoogleAndroid Version2.3 Updaterev1
GoogleAndroid Version2.3.1
GoogleAndroid Version2.3.2
GoogleAndroid Version2.3.3
GoogleAndroid Version2.3.4
GoogleAndroid Version2.3.5
GoogleAndroid Version2.3.6
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 18.38% 0.951
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.