|
22 | 22 | "altnames": [
|
23 | 23 | "Linux L2TP Socket Vuln"
|
24 | 24 | ],
|
25 |
| - "description": "icmp socket of linux kernel... blah blah blah...", |
| 25 | + "description": "Type confusion bug l2tp socket implementation", |
26 | 26 | "impact": "Local privilege escalation to kernel/root from an unprivileged app",
|
27 | 27 | "external_links": [
|
28 | 28 | "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4943",
|
|
125 | 125 | "altnames": [
|
126 | 126 | "ANDROID-21437603/21583894"
|
127 | 127 | ],
|
128 |
| - "description": "Local object serilization attack. The OpenSSLX509Certificate class contains native pointers as class members and they are not marked as transient. A Local app can craft a serialized object and pass through binder and ultimately gain code execution as system", |
| 128 | + "description": "Local object serialization attack. The OpenSSLX509Certificate class contains native pointers as class members and they are not marked as transient. A Local app can craft a serialized object and pass through binder and ultimately gain code execution as system", |
129 | 129 | "impact": "Local unprivilidged app to system_server",
|
130 | 130 | "external_links": [
|
131 | 131 | "https://securityintelligence.com/one-class-to-rule-them-all-new-android-serialization-vulnerability-gives-underprivileged-apps-super-status/",
|
|
243 | 243 | ],
|
244 | 244 | "cvedate": "06/07/2014"
|
245 | 245 | },
|
246 |
| - "Samsung WifiCredService remote code execution": { |
247 |
| - "cve": "Samsung WifiCredService remote code execution", |
| 246 | + "CVE-2015-7888": { |
| 247 | + "cve": "CVE-2015-7888", |
248 | 248 | "altnames": [
|
249 | 249 | ""
|
250 | 250 | ],
|
|
307 | 307 | "https://android.googlesource.com/platform/build/+/refs/tags/android-2.3.7_r1"
|
308 | 308 | ],
|
309 | 309 | "cvedate": "01/27/2012"
|
| 310 | + }, |
| 311 | + "CVE-2015-1538-1": { |
| 312 | + "cve": "CVE-2015-1538", |
| 313 | + "altnames": [ |
| 314 | + "Stagefright" |
| 315 | + ], |
| 316 | + "description": "A media processing issue that can be exploited for code execution", |
| 317 | + "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
| 318 | + "external_links": [ |
| 319 | + "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538", |
| 320 | + "https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/", |
| 321 | + "https://en.wikipedia.org/wiki/Stagefright_(bug)" |
| 322 | + ], |
| 323 | + "cvssv2": 10, |
| 324 | + "patch": [ |
| 325 | + ], |
| 326 | + "cvedate": "09/30/2015" |
| 327 | + }, |
| 328 | + "CVE-2015-1538-2": { |
| 329 | + "cve": "CVE-2015-1538", |
| 330 | + "altnames": [ |
| 331 | + "Stagefright" |
| 332 | + ], |
| 333 | + "description": "A media processing issue that can be exploited for code execution", |
| 334 | + "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
| 335 | + "external_links": [ |
| 336 | + "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538", |
| 337 | + "https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/", |
| 338 | + "https://en.wikipedia.org/wiki/Stagefright_(bug)" |
| 339 | + ], |
| 340 | + "cvssv2": 10, |
| 341 | + "patch": [ |
| 342 | + ], |
| 343 | + "cvedate": "09/30/2015" |
| 344 | + }, |
| 345 | + "CVE-2015-1538-3": { |
| 346 | + "cve": "CVE-2015-1538", |
| 347 | + "altnames": [ |
| 348 | + "Stagefright" |
| 349 | + ], |
| 350 | + "description": "A media processing issue that can be exploited for code execution", |
| 351 | + "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
| 352 | + "external_links": [ |
| 353 | + "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538", |
| 354 | + "https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/", |
| 355 | + "https://en.wikipedia.org/wiki/Stagefright_(bug)" |
| 356 | + ], |
| 357 | + "cvssv2": 10, |
| 358 | + "patch": [ |
| 359 | + ], |
| 360 | + "cvedate": "09/30/2015" |
| 361 | + }, |
| 362 | + "CVE-2015-1538-4": { |
| 363 | + "cve": "CVE-2015-1538", |
| 364 | + "altnames": [ |
| 365 | + "Stagefright" |
| 366 | + ], |
| 367 | + "description": "A media processing issue that can be exploited for code execution", |
| 368 | + "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
| 369 | + "external_links": [ |
| 370 | + "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538", |
| 371 | + "https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/", |
| 372 | + "https://en.wikipedia.org/wiki/Stagefright_(bug)" |
| 373 | + ], |
| 374 | + "cvssv2": 10, |
| 375 | + "patch": [ |
| 376 | + ], |
| 377 | + "cvedate": "09/30/2015" |
| 378 | + }, |
| 379 | + "CVE-2015-1539": { |
| 380 | + "cve": "CVE-2015-1539", |
| 381 | + "altnames": [ |
| 382 | + "Stagefright" |
| 383 | + ], |
| 384 | + "description": "A media processing issue that can be exploited for code execution", |
| 385 | + "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
| 386 | + "external_links": [ |
| 387 | + "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1539", |
| 388 | + "https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/", |
| 389 | + "https://en.wikipedia.org/wiki/Stagefright_(bug)" |
| 390 | + ], |
| 391 | + "cvssv2": 10, |
| 392 | + "patch": [ |
| 393 | + ], |
| 394 | + "cvedate": "09/30/2015" |
| 395 | + }, |
| 396 | + "CVE-2015-3824": { |
| 397 | + "cve": "CVE-2015-3824", |
| 398 | + "altnames": [ |
| 399 | + "Stagefright" |
| 400 | + ], |
| 401 | + "description": "A media processing issue that can be exploited for code execution", |
| 402 | + "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
| 403 | + "external_links": [ |
| 404 | + "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3824", |
| 405 | + "https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/", |
| 406 | + "https://en.wikipedia.org/wiki/Stagefright_(bug)" |
| 407 | + ], |
| 408 | + "cvssv2": 10, |
| 409 | + "patch": [ |
| 410 | + ], |
| 411 | + "cvedate": "09/30/2015" |
| 412 | + }, |
| 413 | + "CVE-2015-3828": { |
| 414 | + "cve": "CVE-2015-3828", |
| 415 | + "altnames": [ |
| 416 | + "Stagefright" |
| 417 | + ], |
| 418 | + "description": "A media processing issue that can be exploited for code execution", |
| 419 | + "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
| 420 | + "external_links": [ |
| 421 | + "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3828", |
| 422 | + "https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/", |
| 423 | + "https://en.wikipedia.org/wiki/Stagefright_(bug)" |
| 424 | + ], |
| 425 | + "cvssv2": 10, |
| 426 | + "patch": [ |
| 427 | + ], |
| 428 | + "cvedate": "09/30/2015" |
| 429 | + }, |
| 430 | + "CVE-2015-3829": { |
| 431 | + "cve": "CVE-2015-3829", |
| 432 | + "altnames": [ |
| 433 | + "Stagefright" |
| 434 | + ], |
| 435 | + "description": "A media processing issue that can be exploited for code execution", |
| 436 | + "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
| 437 | + "external_links": [ |
| 438 | + "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3829", |
| 439 | + "https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/", |
| 440 | + "https://en.wikipedia.org/wiki/Stagefright_(bug)" |
| 441 | + ], |
| 442 | + "cvssv2": 10, |
| 443 | + "patch": [ |
| 444 | + ], |
| 445 | + "cvedate": "09/30/2015" |
| 446 | + }, |
| 447 | + "sf-itunes-poc": { |
| 448 | + "cve": "sf-itunes-poc", |
| 449 | + "altnames": [ |
| 450 | + "Stagefright" |
| 451 | + ], |
| 452 | + "description": "Stagefright bug: A media processing issue that can be exploited for code execution", |
| 453 | + "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
| 454 | + "external_links": [ |
| 455 | + "https://gist.github.com/worawit/f6fb016997bdd6b9e414" |
| 456 | + ], |
| 457 | + "cvssv2": 10, |
| 458 | + "patch": [ |
| 459 | + "https://android.googlesource.com/platform/frameworks/av/+/2b50b7aa7d16014ccf35db7a7b4b5e84f7b4027c" |
| 460 | + ], |
| 461 | + "cvedate": "09/30/2015" |
| 462 | + }, |
| 463 | + "CVE-2015-3864": { |
| 464 | + "cve": "CVE-2015-3864", |
| 465 | + "altnames": [ |
| 466 | + "Stagefright" |
| 467 | + ], |
| 468 | + "description": "This a stagefright bug exploiting a failed patch for the same issue", |
| 469 | + "impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data", |
| 470 | + "external_links": [ |
| 471 | + "https://blog.exodusintel.com/2015/08/13/stagefright-mission-accomplished/", |
| 472 | + "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3864", |
| 473 | + "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3864" |
| 474 | + ], |
| 475 | + "cvssv2": 10, |
| 476 | + "patch": [ |
| 477 | + "https://android.googlesource.com/platform/frameworks/av/+/6fe85f7e15203e48df2cc3e8e1c4bc6ad49dc968" |
| 478 | + ], |
| 479 | + "cvedate": "09/30/2015" |
310 | 480 | }
|
311 | 481 | }
|
0 commit comments