Vulnerability Name: | CVE-2020-0009 (CCN-174168) | ||||||||||||
Assigned: | 2019-10-17 | ||||||||||||
Published: | 2020-01-07 | ||||||||||||
Updated: | 2022-10-14 | ||||||||||||
Summary: | In calc_vm_may_flags of ashmem.c, there is a possible arbitrary write to shared memory due to a permissions bypass. This could lead to local escalation of privilege by corrupting memory shared between processes, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-142938932 | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N) 5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C)
7.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-276 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: CCN Type: Google Web site Android Source: MITRE Type: CNA CVE-2020-0009 Source: MISC Type: Patch, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/155903/Android-ashmem-Read-Only-Bypasses.html Source: XF Type: UNKNOWN android-cve20200009-priv-esc(174168) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update Source: CCN Type: Packet Storm Security [01-10-2020] Android ashmem Read-Only Bypasses Source: CCN Type: Android Open Source Project Android Security BulletinJanuary 2020 Source: CONFIRM Type: Vendor Advisory https://source.android.com/security/bulletin/2020-01-01 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [01-14-2020] | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |