Out-of-Bound Read Vulnerability in Android OS by Google
CVE-2019-2037

7.5HIGH

Key Information:

Vendor
Android
Status
Vendor
CVE Published:
19 April 2019

Summary

In the Android operating system, a flaw exists within the l2cu_send_peer_config_rej function found in l2c_utils.cc. This vulnerability is characterized by the potential for an out-of-bound read caused by an inadequate bounds check. Exploiting this flaw could allow an attacker to gain access to sensitive information remotely without needing any additional execution privileges. Moreover, the vulnerability does not require user interaction, which increases the risk of exploitation.

Affected Version(s)

Android Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.