Integer overflow in the BMP::readFromStream method in the libsgl.so library in Google Android SDK m3-rc37a and earlier, and m5-rc14, allows remote attackers to execute arbitrary code via a crafted BMP file with a header containing a negative offset field.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html - | |
References | () http://securityreason.com/securityalert/3727 - | |
References | () http://www.coresecurity.com/?action=item&id=2148 - Exploit | |
References | () http://www.securityfocus.com/archive/1/489135/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/28006 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/40999 - |
Information
Published : 2008-03-06 00:44
Updated : 2024-11-21 00:43
NVD link : CVE-2008-0986
Mitre link : CVE-2008-0986
CVE.ORG link : CVE-2008-0986
JSON object : View
Products Affected
- android_sdk
CWE
CWE-189
Numeric Errors