Lucene search

K
zdiTeam MBSDZDI-15-256
HistoryJun 24, 2015 - 12:00 a.m.

(0Day) (Mobile Pwn2Own) Samsung Galaxy S5 MethodSpec Deserialization of Untrusted Data Remote Code Execution Vulnerability

2015-06-2400:00:00
Team MBSD
www.zerodayinitiative.com
15

EPSS

0.415

Percentile

97.3%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable Samsung Galaxy S5s. Authentication is not required to exploit this vulnerability. The specific flaw exists within the com.absolute.android.persistence.MethodSpec Class. The createFromParcel() method performs dynamic class loading but does not restrict the source of the classes to be loaded. An attacker can craft a Parcelable object specifying arbitrary class files that will be loaded when the MethodSpec object is deserialized, resulting in remote code execution as the system user.

EPSS

0.415

Percentile

97.3%

Related for ZDI-15-256