Lucene search

K
androidOr Peles and Roee Hay {orpeles,roeeh}@il.ibm.comANDROID:ONE_CLASS_TO_RULE_THEM_ALL
HistoryJun 01, 2015 - 12:00 a.m.

One class to rule them all

2015-06-0100:00:00
Or Peles and Roee Hay {orpeles,roeeh}@il.ibm.com
www.androidvulnerabilities.org
7

0.003 Low

EPSS

Percentile

65.9%

This vulnerability allows for arbitrary code execution in the context of many apps and services and results in elevation of privileges. There is a Proof-of-Concept exploit against the Google Nexus 5 device, that achieves code execution inside the highly privileged system_server process, and then either replaces an existing arbitrary application on the device with our own malware app or changes the device’s SELinux policy. For some other devices, it is also possible to gain kernel code execution by loading an arbitrary kernel modules. This vulnerability was responsibly disclosed to the Android Security Team which tagged it as CVE-2015-3825 internally as ANDROID-21437603/ANDROID-21583849 and patched Android 4.4 / 5.x / M and Google Play Services.
CVE-2015-3825 is the wrong CVE number (duplicate), CVE-2015-3837 should be used instead
The OpenSSLX509Certificate class in org/conscrypt/OpenSSLX509Certificate.java in Android before 5.1.1 LMY48I improperly includes certain context data during serialization and deserialization, which allows attackers to execute arbitrary code via an application that sends a crafted Intent, aka internal bug 21437603.

CPENameOperatorVersion
androidlt4.3-5.1

0.003 Low

EPSS

Percentile

65.9%

Related for ANDROID:ONE_CLASS_TO_RULE_THEM_ALL