Google

Android

7873 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.31%
  • Veröffentlicht 01.10.2015 00:59:29
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple integer overflows in the addVorbisCodecInfo function in matroska/MatroskaExtractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allow remote attackers to cause a denial of service (device inoperability) via crafted Mat...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 01.10.2015 00:59:28
  • Zuletzt bearbeitet 12.04.2025 10:46:40

packages/Keyguard/res/layout/keyguard_password_view.xml in Lockscreen in Android 5.x before 5.1.1 LMY48M does not restrict the number of characters in the passwordEntry input field, which allows physically proximate attackers to bypass intended acces...

  • EPSS 0.16%
  • Veröffentlicht 01.10.2015 00:59:27
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The checkDestination function in internal/telephony/SMSDispatcher.java in Android before 5.1.1 LMY48M relies on an obsolete permission name for an authorization check, which allows attackers to bypass an intended user-confirmation requirement for SMS...

  • EPSS 0.52%
  • Veröffentlicht 01.10.2015 00:59:26
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Region_createFromParcel function in core/jni/android/graphics/Region.cpp in Region in Android before 5.1.1 LMY48M does not check the return values of certain read operations, which allows attackers to execute arbitrary code via an application tha...

  • EPSS 0.11%
  • Veröffentlicht 01.10.2015 00:59:25
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a different applic...

  • EPSS 0.11%
  • Veröffentlicht 01.10.2015 00:59:24
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The getProcessRecordLocked method in services/core/java/com/android/server/am/ActivityManagerService.java in ActivityManager in Android before 5.1.1 LMY48I allows attackers to trigger incorrect process loading via a crafted application, as demonstrat...

  • EPSS 0.49%
  • Veröffentlicht 01.10.2015 00:59:23
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The SIM Toolkit (STK) framework in Android before 5.1.1 LMY48I allows attackers to (1) intercept or (2) emulate unspecified Telephony STK SIM commands via an application that sends a crafted Intent, related to com/android/internal/telephony/cat/AppIn...

  • EPSS 0.47%
  • Veröffentlicht 01.10.2015 00:59:22
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple heap-based buffer overflows in libeffects in the Audio Policy Service in mediaserver in Android before 5.1.1 LMY48I allow attackers to execute arbitrary code via a crafted application, aka internal bug 21953516.

  • EPSS 0.79%
  • Veröffentlicht 01.10.2015 00:59:21
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The OpenSSLX509Certificate class in org/conscrypt/OpenSSLX509Certificate.java in Android before 5.1.1 LMY48I improperly includes certain context data during serialization and deserialization, which allows attackers to execute arbitrary code via an ap...

  • EPSS 4.34%
  • Veröffentlicht 01.10.2015 00:59:20
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The Parse_wave function in arm-wt-22k/lib_src/eas_mdls.c in the Sonivox DLS-to-EAS converter in Android before 5.1.1 LMY48I does not reject a negative value for a certain size field, which allows remote attackers to execute arbitrary code or cause a ...