mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
79 lines
2.9 KiB
JSON
79 lines
2.9 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-49744",
|
|
"ASSIGNER": "security@android.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "In checkKeyIntentParceledCorrectly of AccountManagerService.java, there is a possible way to bypass parcel mismatch mitigation due to unsafe deserialization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Elevation of privilege"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Google",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Android",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "14"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "13"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12L"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "12"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://source.android.com/security/bulletin/2025-01-01",
|
|
"refsource": "MISC",
|
|
"name": "https://source.android.com/security/bulletin/2025-01-01"
|
|
}
|
|
]
|
|
}
|
|
} |