In attp_build_read_by_type_value_cmd of att_protocol.cc , there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
History

Mon, 16 Dec 2024 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Weaknesses CWE-787
CPEs cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
Vendors & Products Google
Google android

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published: 2024-02-16T00:08:15.792Z

Updated: 2024-08-01T17:41:14.691Z

Reserved: 2023-11-16T22:59:10.860Z

Link: CVE-2024-0031

cve-icon Vulnrichment

Updated: 2024-08-01T17:41:14.691Z

cve-icon NVD

Status : Analyzed

Published: 2024-02-16T02:15:50.763

Modified: 2024-12-16T19:30:26.253

Link: CVE-2024-0031

cve-icon Redhat

No data.