Vulnerabilities > Google > Android > 4.4.1

DATE CVE VULNERABILITY TITLE RISK
2015-10-01 CVE-2015-6575 Numeric Errors vulnerability in Google Android
SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I does not properly consider integer promotion, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow and memory corruption) via crafted atoms in MP4 data, aka internal bug 20139950, a different vulnerability than CVE-2015-1538.
network
low complexity
google CWE-189
critical
10.0
2015-10-01 CVE-2015-3864 Numeric Errors vulnerability in Google Android
Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759.
network
low complexity
google CWE-189
critical
10.0
2015-10-01 CVE-2015-3863 Numeric Errors vulnerability in Google Android
Multiple integer overflows in the Blob class in keystore/keystore.cpp in Keystore in Android before 5.1.1 LMY48M allow attackers to execute arbitrary code and read arbitrary Keystore keys via an application that uses a crafted blob in an insert operation, aka internal bug 22802399.
network
google CWE-189
critical
9.3
2015-10-01 CVE-2015-3861 Numeric Errors vulnerability in Google Android
Multiple integer overflows in the addVorbisCodecInfo function in matroska/MatroskaExtractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allow remote attackers to cause a denial of service (device inoperability) via crafted Matroska data, aka internal bug 21296336.
network
low complexity
google CWE-189
5.0
2015-10-01 CVE-2015-3860 Improper Access Control vulnerability in Google Android
packages/Keyguard/res/layout/keyguard_password_view.xml in Lockscreen in Android 5.x before 5.1.1 LMY48M does not restrict the number of characters in the passwordEntry input field, which allows physically proximate attackers to bypass intended access restrictions via a long password that triggers a SystemUI crash, aka internal bug 22214934.
local
low complexity
google CWE-284
7.2
2015-10-01 CVE-2015-3858 Permissions, Privileges, and Access Controls vulnerability in Google Android
The checkDestination function in internal/telephony/SMSDispatcher.java in Android before 5.1.1 LMY48M relies on an obsolete permission name for an authorization check, which allows attackers to bypass an intended user-confirmation requirement for SMS short-code messaging via a crafted application, aka internal bug 22314646.
network
google CWE-264
critical
9.3
2015-10-01 CVE-2015-3849 Permissions, Privileges, and Access Controls vulnerability in Google Android
The Region_createFromParcel function in core/jni/android/graphics/Region.cpp in Region in Android before 5.1.1 LMY48M does not check the return values of certain read operations, which allows attackers to execute arbitrary code via an application that sends a crafted message to a service, aka internal bug 21585255.
network
google CWE-264
critical
9.3
2015-10-01 CVE-2015-3845 Permissions, Privileges, and Access Controls vulnerability in Google Android
The Parcel::appendFrom function in libs/binder/Parcel.cpp in Binder in Android before 5.1.1 LMY48M does not consider parcel boundaries during identification of binder objects in an append operation, which allows attackers to obtain a different application's privileges via a crafted application, aka internal bug 17312693.
network
google CWE-264
6.8
2015-10-01 CVE-2015-3844 Permissions, Privileges, and Access Controls vulnerability in Google Android
The getProcessRecordLocked method in services/core/java/com/android/server/am/ActivityManagerService.java in ActivityManager in Android before 5.1.1 LMY48I allows attackers to trigger incorrect process loading via a crafted application, as demonstrated by interfering with use of the Settings application, aka internal bug 21669445.
network
google CWE-264
6.8
2015-10-01 CVE-2015-3843 Permissions, Privileges, and Access Controls vulnerability in Google Android
The SIM Toolkit (STK) framework in Android before 5.1.1 LMY48I allows attackers to (1) intercept or (2) emulate unspecified Telephony STK SIM commands via an application that sends a crafted Intent, related to com/android/internal/telephony/cat/AppInterface.java, aka internal bug 21697171.
network
google CWE-264
critical
9.3