In scheme of Uri.java, there is a possible way to craft a malformed Uri object due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://android.googlesource.com/platform/frameworks/base/+/e7af00cafb52a25933ec4edb80c5111d42af0237 | Mailing List Patch |
https://source.android.com/security/bulletin/2024-09-01 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Dec 2024, 19:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://android.googlesource.com/platform/frameworks/base/+/e7af00cafb52a25933ec4edb80c5111d42af0237 - Mailing List, Patch | |
References | () https://source.android.com/security/bulletin/2024-09-01 - Patch, Vendor Advisory | |
CPE | cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* |
|
First Time |
Google
Google android |
|
CWE | NVD-CWE-noinfo |
11 Sep 2024, 16:26
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-11 00:15
Updated : 2024-12-17 19:07
NVD link : CVE-2024-40662
Mitre link : CVE-2024-40662
CVE.ORG link : CVE-2024-40662
JSON object : View
Products Affected
- android
CWE