2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-0408" ,
"sourceIdentifier" : "security@android.com" ,
"published" : "2020-10-14T14:15:16.593" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T04:53:27.947" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In remove of String16.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-156999009"
} ,
{
"lang" : "es" ,
"value" : "En la funci\u00f3n remove del archivo String16.cpp, se presenta una posible escritura fuera de l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. Producto: Android, Versiones: Android-11, Android-8.0 Android-8.1 Android-9 Android-10, ID de Android: A-156999009"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 7.2 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-190"
} ,
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8DFAAD08-36DA-4C95-8200-C29FE5B6B854"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D558D965-FA70-4822-A770-419E73BA9ED3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://source.android.com/security/bulletin/2020-10-01" ,
"source" : "security@android.com" ,
"tags" : [
"Vendor Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "https://source.android.com/security/bulletin/2020-10-01" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}