vendor:
Android SDK
by:
Ortega Alfredo _ Core Security Exploit Writers Team
7.5
CVSS
HIGH
Heap-based buffer-overflow
119
CWE
Product Name: Android SDK
Affected Version From: Android SDK m3-rc37a
Affected Version To: Android SDK m3-rc37a
Patch Exists: YES
Related CWE: N/A
CPE: a:android:android_sdk
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Android
2009
Android Heap Overflow
Android Web Browser is prone to a heap-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Successfully exploiting this vulnerability can allow remote attackers to execute arbitrary machine code in the context of the application. Failed attempts will likely result in denial-of-service conditions.
Mitigation:
Input validation should be used to ensure that untrusted data is not copied into a buffer that is too small to contain it.