7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
Recent assessments:
timwr at December 11, 2019 7:11am UTC reported:
There is a working proof of concept available for some devices.
busterb at February 23, 2020 9:20am UTC reported:
There is a working proof of concept available for some devices.
gwillcox-r7 at November 22, 2020 2:48am UTC reported:
There is a working proof of concept available for some devices.
Assessed Attacker Value: 3
Assessed Attacker Value: 3Assessed Attacker Value: 2
packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html
packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html
seclists.org/fulldisclosure/2019/Oct/38
www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215
lists.debian.org/debian-lts-announce/2020/01/msg00013.html
lists.debian.org/debian-lts-announce/2020/03/msg00001.html
seclists.org/bugtraq/2019/Nov/11
security.netapp.com/advisory/ntap-20191031-0005
source.android.com/security/bulletin/2019-10-01
usn.ubuntu.com/4186-1
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P