Lucene search

K
cve[email protected]CVE-2014-7911
HistoryDec 15, 2014 - 6:59 p.m.

CVE-2014-7911

2014-12-1518:59:15
CWE-264
web.nvd.nist.gov
23
cve-2014-7911
objectinputstream
android
deserialization
serialization
arbitrary code execution
arraymap parcel
intent
system_service
bug 15874291
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.4%

luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attackers to execute arbitrary code via a crafted finalize method for a serialized object in an ArrayMap Parcel within an intent sent to system_service, as demonstrated by the finalize method of android.os.BinderProxy, aka Bug 15874291.

Affected configurations

NVD
Node
googleandroidRange≀4.4.4
OR
googleandroidMatch1.0
OR
googleandroidMatch1.1
OR
googleandroidMatch1.5
OR
googleandroidMatch1.6
OR
googleandroidMatch2.0
OR
googleandroidMatch2.0.1
OR
googleandroidMatch2.1
OR
googleandroidMatch2.2
OR
googleandroidMatch2.2rev1
OR
googleandroidMatch2.2.1
OR
googleandroidMatch2.2.2
OR
googleandroidMatch2.2.3
OR
googleandroidMatch2.3
OR
googleandroidMatch2.3rev1
OR
googleandroidMatch2.3.1
OR
googleandroidMatch2.3.2
OR
googleandroidMatch2.3.3
OR
googleandroidMatch2.3.4
OR
googleandroidMatch2.3.5
OR
googleandroidMatch2.3.6
OR
googleandroidMatch2.3.7
OR
googleandroidMatch3.0
OR
googleandroidMatch3.1
OR
googleandroidMatch3.2
OR
googleandroidMatch3.2.1
OR
googleandroidMatch3.2.2
OR
googleandroidMatch3.2.4
OR
googleandroidMatch3.2.6
OR
googleandroidMatch4.0
OR
googleandroidMatch4.0.1
OR
googleandroidMatch4.0.2
OR
googleandroidMatch4.0.3
OR
googleandroidMatch4.0.4
OR
googleandroidMatch4.1
OR
googleandroidMatch4.1.2
OR
googleandroidMatch4.2
OR
googleandroidMatch4.2.1
OR
googleandroidMatch4.2.2
OR
googleandroidMatch4.3
OR
googleandroidMatch4.3.1
OR
googleandroidMatch4.4
OR
googleandroidMatch4.4.1
OR
googleandroidMatch4.4.2
OR
googleandroidMatch4.4.3

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.4%