CVE-2014-7911

Severity

72%

Complexity

39%

Confidentiality

165%

luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attackers to execute arbitrary code via a crafted finalize method for a serialized object in an ArrayMap Parcel within an intent sent to system_service, as demonstrated by the finalize method of android.os.BinderProxy, aka Bug 15874291.

luni/src/main/java/java/io/ObjectInputStream.java in the java.io.ObjectInputStream implementation in Android before 5.0.0 does not verify that deserialization will result in an object that met the requirements for serialization, which allows attackers to execute arbitrary code via a crafted finalize method for a serialized object in an ArrayMap Parcel within an intent sent to system_service, as demonstrated by the finalize method of android.os.BinderProxy, aka Bug 15874291.

CVSS 2.0 Base Score 7.2. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (AV:L/AC:L/Au:N/C:C/I:C/A:C).

Overview

First reported 10 years ago

2014-12-15 18:59:00

Last updated 10 years ago

2014-12-16 18:14:00

Affected Software

Google Android Operating System 1.0

1.0

Google Android Operating System 1.1

1.1

Google Android Operating System 1.5

1.5

Google Android Operating System 1.6

1.6

Google Android Operating System 2.0

2.0

Google Android Operating System 2.0.1

2.0.1

Google Android Operating System 2.1

2.1

Google Android Operating System 2.2

2.2

Google Android Operating System 2.2 Revision 1

2.2

Google Android Operating System 2.2.1

2.2.1

Google Android Operating System 2.2.2

2.2.2

Google Android Operating System 2.2.3

2.2.3

Google Android Operating System 2.3

2.3

Google Android Operating System 2.3 Revision 1

2.3

Google Android Operating System 2.3.1

2.3.1

Google Android Operating System 2.3.2

2.3.2

Google Android Operating System 2.3.3

2.3.3

Google Android Operating System 2.3.4

2.3.4

Google Android Operating System 2.3.5

2.3.5

Google Android Operating System 2.3.6

2.3.6

Google Android Operating System 2.3.7

2.3.7

Google Android Operating System 3.0

3.0

Google Android Operating System 3.1

3.1

Google Android Operating System 3.2

3.2

Google Android Operating System 3.2.1

3.2.1

Google Android Operating System 3.2.2

3.2.2

Google Android Operating System 3.2.4

3.2.4

Google Android Operating System 3.2.6

3.2.6

Google Android Operating System 4.0

4.0

Google Android Operating System 4.0.1

4.0.1

Google Android Operating System 4.0.2

4.0.2

Google Android Operating System 4.0.3

4.0.3

Google Android Operating System 4.0.4

4.0.4

Google Android Operating System 4.1

4.1

Google Android Operating System 4.1.2

4.1.2

Google Android Operating System 4.2 (Jelly Bean)

4.2

Google Android Operating System 4.2.1

4.2.1

Google Android Operating System 4.2.2

4.2.2

Google Android Operating System 4.3

4.3

Google Android Operating System 4.3.1

4.3.1

Google Android Operating System 4.4

4.4

Google Android Operating System 4.4.1

4.4.1

Google Android Operating System 4.4.2

4.4.2

Google Android Operating System 4.4.3

4.4.3

Google Android Operating System

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.