36 lines
1.6 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-0044",
"sourceIdentifier": "security@android.com",
"published": "2024-03-11T17:15:45.450",
"lastModified": "2024-03-12T20:15:07.633",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
},
{
"lang": "es",
"value": "En createSessionInternal de PackageInstallerService.java, existe una posible ejecuci\u00f3n como cualquier aplicaci\u00f3n debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792",
"source": "security@android.com"
},
{
"url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2",
"source": "security@android.com"
},
{
"url": "https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2024-03-01",
"source": "security@android.com"
}
]
}