Lucene search

K
androidJann HornANDROID:OBJECTINPUTSTREAM_DESERIALIZABLE
HistoryNov 14, 2014 - 12:00 a.m.

ObjectInputStream deserializable

2014-11-1400:00:00
Jann Horn
www.androidvulnerabilities.org
3

0.001 Low

EPSS

Percentile

25.4%

In Android <5.0, java.io.ObjectInputStream did not check whether the Object that is being deserialized is actually serializable. That issue was fixed in Android 5.0. This means that when ObjectInputStream is used on untrusted inputs, an attacker can cause an instance of any class with a non-private parameterless constructor to be created. All fields of that instance can be set to arbitrary values. The malicious object will then typically either be ignored or cast to a type to which it doesn’t fit, implying that no methods will be called on it and no data from it will be used. However, when it is collected by the GC, the GC will call the object’s finalize method.
luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attackers to execute arbitrary code via a crafted finalize method for a serialized object in an ArrayMap Parcel within an intent sent to system_service, as demonstrated by the finalize method of android.os.BinderProxy, aka Bug 15874291.
A POC local root exploit is available

CPENameOperatorVersion
androidlt1.0-4.4.4

0.001 Low

EPSS

Percentile

25.4%

Related for ANDROID:OBJECTINPUTSTREAM_DESERIALIZABLE