Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-3874

Overview

Vulnerability Score 9.3 9.3
CVE Id CVE-2011-3874
Last Modified 06 Feb 2012 12:00:00
Published 27 Jan 2012 10:55:04
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2011-3874

Summary

Stack-based buffer overflow in libsysutils in Android 2.2.x through 2.2.2 and 2.3.x through 2.3.6 allows user-assisted remote attackers to execute arbitrary code via an application that calls the FrameworkListener::dispatchCommand method with the wrong number of arguments, as demonstrated by zergRush to trigger a use-after-free error.

Vulnerable Systems

Operating System

  • Google Android 2.2

  • Google Android 2.2.1

  • Google Android 2.2.2

  • Google Android 2.3

  • Google Android 2.3.1

  • Google Android 2.3.2

  • Google Android 2.3.3

  • Google Android 2.3.4

  • Google Android 2.3.5

  • Google Android 2.3.6


References

MISC - https://github.com/revolutionary/zergRush/blob/master/zergRush.c

MLIST - [oss-security] 20111109 Re: Re: CVE request: Android: vold stack buffer overflow

MLIST - [oss-security] 20111108 Re: CVE request: Android: vold stack buffer overflow

MLIST - [oss-security] 20111108 CVE request: Android: vold stack buffer overflow

CONFIRM - http://code.google.com/p/android/issues/detail?id=21681


Last Updated: 27 May 2016 10:58:07