Lucene search

K
zdiJesse Chang and Jack Tang of TrendMicro Mobile Security Research TeamZDI-21-279
HistoryMar 12, 2021 - 12:00 a.m.

Google Android fts_driver_test_write Heap-based Buffer Overflow Privilege Escalation Vulnerability

2021-03-1200:00:00
Jesse Chang and Jack Tang of TrendMicro Mobile Security Research Team
www.zerodayinitiative.com
23
google android
buffer overflow
privilege escalation
arbitrary code execution
kernel execution

EPSS

0.001

Percentile

19.5%

This vulnerability allows local attackers to execute arbitrary code on affected installations of Google Android. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the fts_driver_test_write function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.

EPSS

0.001

Percentile

19.5%

Related for ZDI-21-279