Description
libs/binder/Parcel.cpp in the Parcels Framework APIs in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not validate the return value of the dup system call, which allows attackers to bypass an isolation protection mechanism via a crafted application, aka internal bug 28395952.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-4763 | libs/binder/Parcel.cpp in the Parcels Framework APIs in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 does not validate the return value of the dup system call, which allows attackers to bypass an isolation protection mechanism via a crafted application, aka internal bug 28395952. |
References
History
No history.
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-08-06T00:03:34.486Z
Reserved: 2016-03-30T00:00:00.000Z
Link: CVE-2016-3750
No data.
Status : Modified
Published: 2016-07-11T01:59:50.590
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-3750
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD