SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Device (VoIP/Phone/FAX)  >   Google Android Vendors:   Google
Google Android Multiple Flaws Let Remote Users Execute Arbitrary Code and Applications Gain Elevated Privileges
SecurityTracker Alert ID:  1034592
SecurityTracker URL:  http://securitytracker.com/id/1034592
CVE Reference:   CVE-2015-5310, CVE-2015-6617, CVE-2015-6636, CVE-2015-6637, CVE-2015-6638, CVE-2015-6639, CVE-2015-6640, CVE-2015-6641, CVE-2015-6642, CVE-2015-6643, CVE-2015-6644, CVE-2015-6645, CVE-2015-6646, CVE-2015-6647, CVE-2015-7613   (Links to External Site)
Date:  Jan 6 2016
Impact:   Denial of service via local system, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.4.4, 5.0, 5.1.1, 6.0, 6.0.1
Description:   Multiple vulnerabilities were reported in Google Android. An application can cause denial of service conditions on the target system. An application or a remote user can obtain potentially sensitive information. An application can obtain elevated privileges on the target system. A remote user can execute arbitrary code on the target system.

A remote user can create a specially crafted file that, when loaded by the Mediaserver, will trigger a memory corruption error and execute arbitrary code [CVE-2015-6636]. The code will run the privileges of the mediaserver process.

An application can trigger a flaw in the misc-sd driver from MediaTek to execute arbitrary code with kernel-level privileges [CVE-2015-6637].

An application can trigger a flaw in the a kernel driver from Imagination Technologies to execute arbitrary code with kernel-level privileges [CVE-2015-6638].

The Widevine QSEE TrustZone application can be exploited to gain elevated privileges [CVE-2015-6639, CVE-2015-6647].

An application can trigger an unspecified flaw in the kernel to gain elevated privileges [CVE-2015-6640].

A remote device that is connected via Bluetooth can gain access to the target user's Contacts [CVE-2015-6641].

An application can exploit an information disclosure flaw in the kernel to bypass security controls or gain elevated privileges [CVE-2015-6642].

A physically local user can exploit a flaw in the Setup Wizard to obtain device settings and cause the device to reset [CVE-2015-6643].

A remote user within Wi-Fi range of the target system can gain access to Wi-Fi service information [CVE-2015-5310].

An application can exploit a flaw in Bouncy Castle to access the target user's private information [CVE-2015-6644].

An application can exploit a flaw in the SyncManager to trigger a reboot loop [CVE-2015-6645].

Abhishek Arya, Oliver Chang, and Martin Barbella of Google Chrome Security Team, Sen Nie (@nforest_) and jfang of KEEN lab, Tencent (@K33nTeam), Yabin Cui from Android Bionic Team, Tom Craig of Google X, Jann Horn (https://thejh.net), Jouni Malinen PGP id EFC895FA, and Quan Nguyen of Google Information Security Engineer Team reported these vulnerabilities.

Impact:   An application can cause denial of service conditions on the target system.

An application or a remote user can obtain potentially sensitive information on the target system.

An application can obtain elevated privileges on the target system.

A remote user can execute arbitrary code on the target system.

Solution:   The vendor has issued a fix (Build LMY49F, 6.0 with Security Patch Level of January 1, 2016).

The vendor's advisory is available at:

http://source.android.com/security/bulletin/2016-01-01.html

Vendor URL:  source.android.com/security/bulletin/2016-01-01.html (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC