vendor:
Android
by:
Project Zero
7,5
CVSS
HIGH
Information Disclosure
200
CWE
Product Name: Android
Affected Version From: Verified on google/razor/flo:6.0.1/MMB29O/2459718:user/release-keys
Affected Version To: Verified on google/razor/flo:6.0.1/MMB29O/2459718:user/release-keys
Patch Exists: YES
Related CWE: N/A
CPE: google/razor/flo:6.0.1/MMB29O/2459718:user/release-keys
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Verified on google/razor/flo:6.0.1/MMB29O/2459718:user/release-keys
2016
Android: Information Disclosure in IOMX getConfig/getParameter
The GET_CONFIG and GET_PARAMETER calls on IOMX are vulnerable to an information disclosure of uninitialized heap memory. This could be used by an attacker to break ASLR in the media server process by reading out heap memory which contains useful address information. The vulnerability stems from the fact that Parcel::read(void* outData, size_t len) fails quickly if it doesn’t have sufficient data in the parcel to satisfy the request leaving the outData buffer untouched. As long as the call to getParameter or getConfig succeed then the entire, mostly uninitialized buffer will be returned.
Mitigation:
Check the result of data.read to ensure all the data has been read correctly.