mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-07 05:28:59 +00:00
36 lines
1.6 KiB
JSON
36 lines
1.6 KiB
JSON
{
|
|
"id": "CVE-2024-0044",
|
|
"sourceIdentifier": "security@android.com",
|
|
"published": "2024-03-11T17:15:45.450",
|
|
"lastModified": "2024-03-12T20:15:07.633",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In createSessionInternal of PackageInstallerService.java, there is a possible run-as any app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En createSessionInternal de PackageInstallerService.java, existe una posible ejecuci\u00f3n como cualquier aplicaci\u00f3n debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda conducir a una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://android.googlesource.com/platform/frameworks/base/+/65bd134b0a82c51a143b89821d5cdd00ddc31792",
|
|
"source": "security@android.com"
|
|
},
|
|
{
|
|
"url": "https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-m7fh-f3w4-r6v2",
|
|
"source": "security@android.com"
|
|
},
|
|
{
|
|
"url": "https://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html",
|
|
"source": "security@android.com"
|
|
},
|
|
{
|
|
"url": "https://source.android.com/security/bulletin/2024-03-01",
|
|
"source": "security@android.com"
|
|
}
|
|
]
|
|
} |