Access Restriction Bypass Affecting android-platform-system-core package, versions <1:7.0.0+r1-4


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
3.55% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-ANDROIDPLATFORMSYSTEMCORE-338538
  • published11 Sept 2016
  • disclosed11 Sept 2016

Introduced: 11 Sep 2016

CVE-2016-3861  (opens in a new tab)
CWE-264  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade Debian:10 android-platform-system-core to version 1:7.0.0+r1-4 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream android-platform-system-core package and not the android-platform-system-core package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

LibUtils in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 mishandles conversions between Unicode character encodings with different encoding widths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted file, aka internal bug 29250543.