server/TetherController.cpp in the tethering controller in netd, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly validate upstream interface names, which allows attackers to bypass intended access restrictions via a crafted application.
References
Configurations
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () http://source.android.com/security/bulletin/2016-05-01.html - Vendor Advisory | |
References | () https://www.codeaurora.org/improper-input-validation-tethering-controller-netd-cve-2016-2060-0 - Patch |
Information
Published : 2016-05-09 10:59
Updated : 2024-11-21 02:47
NVD link : CVE-2016-2060
Mitre link : CVE-2016-2060
CVE.ORG link : CVE-2016-2060
JSON object : View
Products Affected
- android
CWE
CWE-264
Permissions, Privileges, and Access Controls