Skip to content

Commit 3da9877

Browse files
committed
Merge pull request #74 from licaon-kter/patch-1
Small grammar fixes
2 parents 540da5f + 3f4ede1 commit 3da9877

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

app/src/main/assets/vuln_map.json

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@
4141
"internal bug 19334482"
4242
],
4343
"description": "Integer overflow in the native_handle_create function in libcutils/native_handle.c in Android before 5.1.1 LMY48M allows attackers to obtain a different application's privileges or cause a denial of service (Binder heap memory corruption) via a crafted application, aka internal bug 19334482.",
44-
"impact": "local unprivilidged app to system app escalation",
44+
"impact": "local unprivileged app to system app escalation",
4545
"external_links": [
4646
"https://groups.google.com/forum/message/raw?msg=android-security-updates/1M7qbSvACjo/Y7jewiW1AwAJ"
4747
],
@@ -58,7 +58,7 @@
5858
"Android Fake ID"
5959
],
6060
"description": "The bug allows malicious apps to pretend to be signed by trusted providers and be loaded as extensions in several contexts, such as NFC access, browser plugins and others, depending on the device and which extension mechanisms the manufacturer chose to include.",
61-
"impact": "Local malicious app can elevate privilidges to gain some select access such as browser plugins and NFC.",
61+
"impact": "Local malicious app can elevate privileges to gain some select access such as browser plugins and NFC.",
6262
"external_links": [
6363
"https://bluebox.com/android-fake-id-vulnerability/"
6464
],
@@ -75,7 +75,7 @@
7575
"Stagefright 2.0"
7676
],
7777
"description": "Remote code execution as media_server. Fixed in Android 5.1.1_r9/LMY48K",
78-
"impact": "Remote attacker can use a malformed video file to gain code execution with somewhat elevated privilidges. ",
78+
"impact": "Remote attacker can use a malformed video file to gain code execution with somewhat elevated privileges. ",
7979
"external_links": [
8080
"https://threatpost.com/stagefright-2-0-vulnerabilities-affect-1-billion-android-devices/114863/",
8181
"https://blog.zimperium.com/zimperium-zlabs-is-raising-the-volume-new-vulnerability-processing-mp3mp4-media/"
@@ -110,7 +110,7 @@
110110
"Object Serialization attack"
111111
],
112112
"description": "luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attackers to execute arbitrary code via a crafted finalize method for a serialized object in an ArrayMap Parcel within an intent sent to system_service, as demonstrated by the finalize method of android.os.BinderProxy, aka Bug 15874291",
113-
"impact": "Local unprivilidged app can elevate to system user",
113+
"impact": "Local unprivileged app can elevate to system user",
114114
"external_links": [
115115
"http://seclists.org/fulldisclosure/2014/Nov/51"
116116
],
@@ -126,7 +126,7 @@
126126
"ANDROID-21437603/21583894"
127127
],
128128
"description": "Local object serialization attack. The OpenSSLX509Certificate class contains native pointers as class members and they are not marked as transient. A Local app can craft a serialized object and pass through binder and ultimately gain code execution as system",
129-
"impact": "Local unprivilidged app to system_server",
129+
"impact": "Local unprivileged app to system_server",
130130
"external_links": [
131131
"https://securityintelligence.com/one-class-to-rule-them-all-new-android-serialization-vulnerability-gives-underprivileged-apps-super-status/",
132132
"https://www.usenix.org/conference/woot15/workshop-program/presentation/peles"
@@ -144,7 +144,7 @@
144144
"Masterkey"
145145
],
146146
"description": "Zip bug allows modifying apk files without breaking the signature. Essentially, you can replace existing files in an app. Fixed around Android 4.4",
147-
"impact": "A local attacker can modify a system apk file and gain elevated privilidges. A remote attacker can try to trick the user (or another app) into installing the malicious apk file.",
147+
"impact": "A local attacker can modify a system apk file and gain elevated privileges. A remote attacker can try to trick the user (or another app) into installing the malicious apk file.",
148148
"external_links": [
149149
"https://bluebox.com/uncovering-android-master-key-that-makes-99-of-devices-vulnerable/",
150150
"http://www.saurik.com/id/17"
@@ -162,7 +162,7 @@
162162
"Masterkey #2"
163163
],
164164
"description": "Zip bug allows modifying apk files without breaking the signature. Based on reading unsigned 16 bit numbers from th zip header and interpreting them as signed 32 bit numbers.",
165-
"impact": "A local attacker can modify a system apk file and gain elevated privilidges. A remote attacker can try to trick the user (or another app) into installing the malicious apk file.",
165+
"impact": "A local attacker can modify a system apk file and gain elevated privileges. A remote attacker can try to trick the user (or another app) into installing the malicious apk file.",
166166
"external_links": [
167167
"http://www.androidpolice.com/2013/07/11/second-all-access-apk-exploit-is-revealed-just-two-days-after-master-key-goes-public-already-patched-by-google/"
168168
],
@@ -179,7 +179,7 @@
179179
"Masterkey #3"
180180
],
181181
"description": "Zip bug allows modifying apk files without breaking the signature. Based on improper parsing of the 'name' length in the zip file.",
182-
"impact": "A local attacker can modify a system apk file and gain elevated privilidges. A remote attacker can try to trick the user (or another app) into installing the malicious apk file.",
182+
"impact": "A local attacker can modify a system apk file and gain elevated privileges. A remote attacker can try to trick the user (or another app) into installing the malicious apk file.",
183183
"external_links": [
184184
"http://www.saurik.com/id/19"
185185
],
@@ -248,8 +248,8 @@
248248
"altnames": [
249249
""
250250
],
251-
"description": "Remote Code Execution as System User. Android 5.0+, Samsung. This is yet another non-memory corrupting remote execution on samsung phones.",
252-
"impact": "Remote attacker can gain code execution as system used by getting the user to download an email attachment or brows to a crafted web page.",
251+
"description": "Remote Code Execution as System User. Android 5.0+, Samsung. This is yet another non-memory corrupting remote execution on Samsung devices.",
252+
"impact": "Remote attacker can gain code execution as system user by getting the user to download an email attachment or browse to a crafted web page.",
253253
"external_links": [
254254
"http://blog.quarkslab.com/remote-code-execution-as-system-user-on-android-5-samsung-devices-abusing-wificredservice-hotspot-20.html"
255255
],

0 commit comments

Comments
 (0)