ID

VAR-202410-3624


CVE

CVE-2024-47041


TITLE

Google  of  Android  Out-of-bounds read vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2024-012041

DESCRIPTION

In valid_address of syscall.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Google of Android Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Google Pixel is a smartphone produced by Google in the United States. Google Pixel has a buffer overflow vulnerability, which is caused by incorrect boundary checking in valid_address of syscall.c. Attackers can exploit this vulnerability to cause out-of-bounds reading

Trust: 2.16

sources: NVD: CVE-2024-47041 // JVNDB: JVNDB-2024-012041 // CNVD: CNVD-2024-45888

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-45888

AFFECTED PRODUCTS

vendor:googlemodel:androidscope:eqversion: -

Trust: 1.8

vendor:googlemodel:androidscope: - version: -

Trust: 0.8

vendor:googlemodel:pixelscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2024-45888 // JVNDB: JVNDB-2024-012041 // NVD: CVE-2024-47041

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-47041
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-47041
value: HIGH

Trust: 1.0

NVD: CVE-2024-47041
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-45888
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-45888
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2024-47041
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-47041
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.4
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2024-47041
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-45888 // JVNDB: JVNDB-2024-012041 // NVD: CVE-2024-47041 // NVD: CVE-2024-47041

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

problemtype:Out-of-bounds read (CWE-125) [NVD evaluation ]

Trust: 0.8

problemtype: Out-of-bounds read (CWE-125) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-012041 // NVD: CVE-2024-47041

PATCH

title:Patch for Google Pixel syscall.c file buffer overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/611816

Trust: 0.6

sources: CNVD: CNVD-2024-45888

EXTERNAL IDS

db:NVDid:CVE-2024-47041

Trust: 3.2

db:JVNDBid:JVNDB-2024-012041

Trust: 0.8

db:CNVDid:CNVD-2024-45888

Trust: 0.6

sources: CNVD: CNVD-2024-45888 // JVNDB: JVNDB-2024-012041 // NVD: CVE-2024-47041

REFERENCES

url:https://source.android.com/security/bulletin/pixel/2024-10-01

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-47041

Trust: 1.4

sources: CNVD: CNVD-2024-45888 // JVNDB: JVNDB-2024-012041 // NVD: CVE-2024-47041

SOURCES

db:CNVDid:CNVD-2024-45888
db:JVNDBid:JVNDB-2024-012041
db:NVDid:CVE-2024-47041

LAST UPDATE DATE

2024-11-26T23:06:37.200000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-45888date:2024-11-25T00:00:00
db:JVNDBid:JVNDB-2024-012041date:2024-11-06T01:57:00
db:NVDid:CVE-2024-47041date:2024-11-04T22:16:13.793

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-45888date:2024-11-08T00:00:00
db:JVNDBid:JVNDB-2024-012041date:2024-11-06T00:00:00
db:NVDid:CVE-2024-47041date:2024-10-25T11:15:17.667