nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0049

CVE-2020-0128 (High) detected in avandroid-9.0.0_r56

Opened this issue · 0 comments

CVE-2020-0128 - High Severity Vulnerability

Vulnerable Library - avandroid-9.0.0_r56

Library home page: https://android.googlesource.com/platform/frameworks/av

Found in HEAD commit: a73c164aad600745ef8701c494b86c09c4fb7438

Found in base branch: master

Vulnerable Source Files (3)

/media/libstagefright/rtsp/AMPEG4ElementaryAssembler.cpp
/media/libstagefright/rtsp/AMPEG4ElementaryAssembler.cpp
/media/libstagefright/rtsp/AMPEG4ElementaryAssembler.cpp

Vulnerability Details

In addPacket of AMPEG4ElementaryAssembler, there is an out of bounds read due to an integer overflow. This could lead to remote information disclosure with no additional execution privileges required. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-123940919

Publish Date: 2020-06-11

URL: CVE-2020-0128

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://android.googlesource.com/platform/frameworks/av/+/refs/tags/android-10.0.0_r37

Release Date: 2020-06-11

Fix Resolution: android-10.0.0_r37


Step up your Open Source Security Game with Mend here