Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-2219 (GCVE-0-2019-2219)
Vulnerability from cvelistv5 – Published: 2019-12-06 22:40 – Updated: 2024-08-04 18:42- Information disclosure
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T18:42:50.871Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://source.android.com/security/bulletin/2021-05-01"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Android",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Android-11"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In several functions of NotificationManagerService.java and related files, there is a possible way to record audio from the background without notification to the user due to a permission bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119041698"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-21T13:13:12",
"orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
"shortName": "google_android"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://source.android.com/security/bulletin/2021-05-01"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@android.com",
"ID": "CVE-2019-2219",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_value": "Android-11"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In several functions of NotificationManagerService.java and related files, there is a possible way to record audio from the background without notification to the user due to a permission bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119041698"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://source.android.com/security/bulletin/2021-05-01",
"refsource": "MISC",
"url": "https://source.android.com/security/bulletin/2021-05-01"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
"assignerShortName": "google_android",
"cveId": "CVE-2019-2219",
"datePublished": "2019-12-06T22:40:40",
"dateReserved": "2018-12-10T00:00:00",
"dateUpdated": "2024-08-04T18:42:50.871Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DFAAD08-36DA-4C95-8200-C29FE5B6B854\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D558D965-FA70-4822-A770-419E73BA9ED3\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In several functions of NotificationManagerService.java and related files, there is a possible way to record audio from the background without notification to the user due to a permission bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119041698\"}, {\"lang\": \"es\", \"value\": \"En varias funciones de NotificationManagerService.java y archivos relacionados, existe una posible forma de grabar audio desde el fondo sin notificar al usuario debido a un bypass de permisos. Esto podr\\u00eda llevar a una escalada local de privilegios con necesidad de privilegios de ejecuci\\u00f3n de usuario. La interacci\\u00f3n del usuario no es necesaria para la explotaci\\u00f3n.Producto: AndroidVersiones: Android-11Android ID: A-119041698\"}]",
"id": "CVE-2019-2219",
"lastModified": "2024-11-21T04:40:27.583",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 4.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.0, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:C/I:N/A:N\", \"baseScore\": 4.7, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.4, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-12-06T23:15:11.990",
"references": "[{\"url\": \"https://source.android.com/security/bulletin/2021-05-01\", \"source\": \"security@android.com\"}, {\"url\": \"https://source.android.com/security/bulletin/2021-05-01\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@android.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-362\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-2219\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2019-12-06T23:15:11.990\",\"lastModified\":\"2024-11-21T04:40:27.583\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In several functions of NotificationManagerService.java and related files, there is a possible way to record audio from the background without notification to the user due to a permission bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119041698\"},{\"lang\":\"es\",\"value\":\"En varias funciones de NotificationManagerService.java y archivos relacionados, existe una posible forma de grabar audio desde el fondo sin notificar al usuario debido a un bypass de permisos. Esto podr\u00eda llevar a una escalada local de privilegios con necesidad de privilegios de ejecuci\u00f3n de usuario. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n.Producto: AndroidVersiones: Android-11Android ID: A-119041698\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:C/I:N/A:N\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DFAAD08-36DA-4C95-8200-C29FE5B6B854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D558D965-FA70-4822-A770-419E73BA9ED3\"}]}]}],\"references\":[{\"url\":\"https://source.android.com/security/bulletin/2021-05-01\",\"source\":\"security@android.com\"},{\"url\":\"https://source.android.com/security/bulletin/2021-05-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GHSA-VRPR-P6W2-CRWX
Vulnerability from github – Published: 2022-05-24 17:02 – Updated: 2022-05-24 17:02In System UI, there is a possible bypass of user's consent for access to sensor data due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-119041698
{
"affected": [],
"aliases": [
"CVE-2019-2219"
],
"database_specific": {
"cwe_ids": [
"CWE-362"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-12-06T23:15:00Z",
"severity": "MODERATE"
},
"details": "In System UI, there is a possible bypass of user\u0027s consent for access to sensor data due to a race condition. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-119041698",
"id": "GHSA-vrpr-p6w2-crwx",
"modified": "2022-05-24T17:02:50Z",
"published": "2022-05-24T17:02:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-2219"
},
{
"type": "WEB",
"url": "https://source.android.com/security/bulletin/2019-12-01"
},
{
"type": "WEB",
"url": "https://source.android.com/security/bulletin/2020-06-01"
},
{
"type": "WEB",
"url": "https://source.android.com/security/bulletin/2021-05-01"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTFR-2021-AVI-337
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans le correctif du 5 mai 2021",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0485"
},
{
"name": "CVE-2021-0484",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0484"
},
{
"name": "CVE-2021-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0466"
},
{
"name": "CVE-2020-11279",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11279"
},
{
"name": "CVE-2021-0324",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0324"
},
{
"name": "CVE-2021-1905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1905"
},
{
"name": "CVE-2021-0473",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0473"
},
{
"name": "CVE-2020-29661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"name": "CVE-2020-27786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27786"
},
{
"name": "CVE-2021-0491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0491"
},
{
"name": "CVE-2021-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0495"
},
{
"name": "CVE-2021-1910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1910"
},
{
"name": "CVE-2021-0475",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0475"
},
{
"name": "CVE-2021-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0494"
},
{
"name": "CVE-2019-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2219"
},
{
"name": "CVE-2021-0496",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0496"
},
{
"name": "CVE-2020-11289",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11289"
},
{
"name": "CVE-2021-0472",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0472"
},
{
"name": "CVE-2021-0476",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0476"
},
{
"name": "CVE-2020-11285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11285"
},
{
"name": "CVE-2021-28663",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28663"
},
{
"name": "CVE-2021-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0498"
},
{
"name": "CVE-2021-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0467"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2021-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1906"
},
{
"name": "CVE-2020-11295",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11295"
},
{
"name": "CVE-2021-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0480"
},
{
"name": "CVE-2020-11294",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11294"
},
{
"name": "CVE-2020-11284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11284"
},
{
"name": "CVE-2021-28664",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28664"
},
{
"name": "CVE-2021-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0492"
},
{
"name": "CVE-2021-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1927"
},
{
"name": "CVE-2021-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0497"
},
{
"name": "CVE-2021-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1891"
},
{
"name": "CVE-2021-0489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0489"
},
{
"name": "CVE-2021-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0482"
},
{
"name": "CVE-2021-0477",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0477"
},
{
"name": "CVE-2020-11288",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11288"
},
{
"name": "CVE-2021-0474",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0474"
},
{
"name": "CVE-2021-0487",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0487"
},
{
"name": "CVE-2020-11273",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11273"
},
{
"name": "CVE-2020-11293",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11293"
},
{
"name": "CVE-2021-0481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0481"
},
{
"name": "CVE-2021-0493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0493"
},
{
"name": "CVE-2021-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1915"
},
{
"name": "CVE-2021-0490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0490"
},
{
"name": "CVE-2020-11254",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11254"
},
{
"name": "CVE-2020-27825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27825"
},
{
"name": "CVE-2020-11274",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11274"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-337",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Android. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel 2021-05-01 du 03 mai 2021",
"url": "https://source.android.com/security/bulletin/pixel/2021-05-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android 2021-05-01 du 03 mai 2021",
"url": "https://source.android.com/security/bulletin/2021-05-01"
}
]
}
CERTFR-2020-AVI-331
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Android toutes versions sans le correctif de s\u00e9curit\u00e9 du 01 juin 2020",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-0197",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0197"
},
{
"name": "CVE-2020-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0176"
},
{
"name": "CVE-2019-13135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13135"
},
{
"name": "CVE-2020-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0165"
},
{
"name": "CVE-2020-0120",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0120"
},
{
"name": "CVE-2019-19529",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19529"
},
{
"name": "CVE-2020-0137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0137"
},
{
"name": "CVE-2020-0206",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0206"
},
{
"name": "CVE-2020-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0216"
},
{
"name": "CVE-2020-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0204"
},
{
"name": "CVE-2020-0177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0177"
},
{
"name": "CVE-2020-0194",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0194"
},
{
"name": "CVE-2020-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0095"
},
{
"name": "CVE-2020-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3660"
},
{
"name": "CVE-2020-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0212"
},
{
"name": "CVE-2020-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3658"
},
{
"name": "CVE-2020-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0153"
},
{
"name": "CVE-2020-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0211"
},
{
"name": "CVE-2020-0234",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0234"
},
{
"name": "CVE-2020-3661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3661"
},
{
"name": "CVE-2020-0199",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0199"
},
{
"name": "CVE-2020-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0210"
},
{
"name": "CVE-2020-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0161"
},
{
"name": "CVE-2017-9704",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9704"
},
{
"name": "CVE-2020-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0168"
},
{
"name": "CVE-2019-10501",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10501"
},
{
"name": "CVE-2019-19543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
},
{
"name": "CVE-2019-10626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10626"
},
{
"name": "CVE-2020-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0144"
},
{
"name": "CVE-2020-0233",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0233"
},
{
"name": "CVE-2020-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0160"
},
{
"name": "CVE-2019-19526",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19526"
},
{
"name": "CVE-2020-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0187"
},
{
"name": "CVE-2020-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0167"
},
{
"name": "CVE-2020-0118",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0118"
},
{
"name": "CVE-2020-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0179"
},
{
"name": "CVE-2020-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3614"
},
{
"name": "CVE-2020-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0145"
},
{
"name": "CVE-2020-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0171"
},
{
"name": "CVE-2020-3642",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3642"
},
{
"name": "CVE-2020-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0151"
},
{
"name": "CVE-2020-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0185"
},
{
"name": "CVE-2020-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0115"
},
{
"name": "CVE-2020-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0147"
},
{
"name": "CVE-2020-0113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0113"
},
{
"name": "CVE-2019-19071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19071"
},
{
"name": "CVE-2020-0141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0141"
},
{
"name": "CVE-2019-18683",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18683"
},
{
"name": "CVE-2020-0133",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0133"
},
{
"name": "CVE-2020-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0140"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2020-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0131"
},
{
"name": "CVE-2020-3662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3662"
},
{
"name": "CVE-2020-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0139"
},
{
"name": "CVE-2020-0143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0143"
},
{
"name": "CVE-2020-0136",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0136"
},
{
"name": "CVE-2020-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0169"
},
{
"name": "CVE-2020-0186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0186"
},
{
"name": "CVE-2020-0132",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0132"
},
{
"name": "CVE-2020-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0149"
},
{
"name": "CVE-2019-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2219"
},
{
"name": "CVE-2020-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0172"
},
{
"name": "CVE-2020-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0156"
},
{
"name": "CVE-2020-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0158"
},
{
"name": "CVE-2020-3676",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3676"
},
{
"name": "CVE-2020-0124",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0124"
},
{
"name": "CVE-2020-0203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0203"
},
{
"name": "CVE-2020-0142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0142"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2020-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3635"
},
{
"name": "CVE-2020-0232",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0232"
},
{
"name": "CVE-2020-0116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0116"
},
{
"name": "CVE-2020-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0215"
},
{
"name": "CVE-2020-8428",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8428"
},
{
"name": "CVE-2020-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0154"
},
{
"name": "CVE-2020-0134",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0134"
},
{
"name": "CVE-2020-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0164"
},
{
"name": "CVE-2019-14080",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14080"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2020-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0155"
},
{
"name": "CVE-2020-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0217"
},
{
"name": "CVE-2020-0163",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0163"
},
{
"name": "CVE-2020-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0170"
},
{
"name": "CVE-2020-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0114"
},
{
"name": "CVE-2020-0235",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0235"
},
{
"name": "CVE-2020-0191",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0191"
},
{
"name": "CVE-2020-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0188"
},
{
"name": "CVE-2019-14092",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14092"
},
{
"name": "CVE-2020-0127",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0127"
},
{
"name": "CVE-2020-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0213"
},
{
"name": "CVE-2020-0196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0196"
},
{
"name": "CVE-2020-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0193"
},
{
"name": "CVE-2020-0126",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0126"
},
{
"name": "CVE-2020-0121",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0121"
},
{
"name": "CVE-2019-10597",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10597"
},
{
"name": "CVE-2019-14076",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14076"
},
{
"name": "CVE-2020-0181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0181"
},
{
"name": "CVE-2020-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0135"
},
{
"name": "CVE-2019-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14062"
},
{
"name": "CVE-2020-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0183"
},
{
"name": "CVE-2020-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0117"
},
{
"name": "CVE-2020-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3628"
},
{
"name": "CVE-2020-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0148"
},
{
"name": "CVE-2020-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0166"
},
{
"name": "CVE-2019-14073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14073"
},
{
"name": "CVE-2020-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0208"
},
{
"name": "CVE-2020-0162",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0162"
},
{
"name": "CVE-2019-14047",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14047"
},
{
"name": "CVE-2020-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0207"
},
{
"name": "CVE-2019-9460",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9460"
},
{
"name": "CVE-2020-0200",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0200"
},
{
"name": "CVE-2020-0190",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0190"
},
{
"name": "CVE-2019-14094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14094"
},
{
"name": "CVE-2020-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0173"
},
{
"name": "CVE-2020-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0152"
},
{
"name": "CVE-2020-0138",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0138"
},
{
"name": "CVE-2020-0195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0195"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0128"
},
{
"name": "CVE-2020-0219",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0219"
},
{
"name": "CVE-2020-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0184"
},
{
"name": "CVE-2020-0223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0223"
},
{
"name": "CVE-2020-0180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0180"
},
{
"name": "CVE-2020-0125",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0125"
},
{
"name": "CVE-2020-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0209"
},
{
"name": "CVE-2020-0198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0198"
},
{
"name": "CVE-2019-18786",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18786"
},
{
"name": "CVE-2020-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0119"
},
{
"name": "CVE-2020-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0175"
},
{
"name": "CVE-2020-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0129"
},
{
"name": "CVE-2020-8597",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8597"
},
{
"name": "CVE-2019-16275",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16275"
},
{
"name": "CVE-2020-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3665"
},
{
"name": "CVE-2020-0182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0182"
},
{
"name": "CVE-2020-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0205"
},
{
"name": "CVE-2020-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3626"
},
{
"name": "CVE-2020-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0192"
},
{
"name": "CVE-2019-14091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14091"
},
{
"name": "CVE-2020-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0150"
},
{
"name": "CVE-2020-0189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0189"
},
{
"name": "CVE-2020-0178",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0178"
},
{
"name": "CVE-2020-0202",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0202"
},
{
"name": "CVE-2020-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0157"
},
{
"name": "CVE-2020-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0146"
},
{
"name": "CVE-2020-3663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3663"
},
{
"name": "CVE-2020-0214",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0214"
},
{
"name": "CVE-2020-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0174"
},
{
"name": "CVE-2020-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0159"
},
{
"name": "CVE-2020-0218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0218"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2020-0201",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0201"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-331",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-06-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 01 juin 2020",
"url": "https://source.android.com/security/bulletin/2020-06-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel du 01 juin 2020",
"url": "https://source.android.com/security/bulletin/pixel/2020-06-01"
}
]
}
CERTFR-2019-AVI-601
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans le correctif du 02 d\u00e9cembre 2019",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-10516",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10516"
},
{
"name": "CVE-2019-10605",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10605"
},
{
"name": "CVE-2019-10595",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10595"
},
{
"name": "CVE-2017-18379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18379"
},
{
"name": "CVE-2019-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2226"
},
{
"name": "CVE-2019-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2242"
},
{
"name": "CVE-2019-10517",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10517"
},
{
"name": "CVE-2019-2221",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2221"
},
{
"name": "CVE-2019-9464",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9464"
},
{
"name": "CVE-2019-10557",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10557"
},
{
"name": "CVE-2019-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2229"
},
{
"name": "CVE-2019-10525",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10525"
},
{
"name": "CVE-2019-10601",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10601"
},
{
"name": "CVE-2019-2228",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2228"
},
{
"name": "CVE-2019-10537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10537"
},
{
"name": "CVE-2019-9468",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9468"
},
{
"name": "CVE-2019-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2227"
},
{
"name": "CVE-2019-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2219"
},
{
"name": "CVE-2019-10480",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10480"
},
{
"name": "CVE-2019-10500",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10500"
},
{
"name": "CVE-2019-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2304"
},
{
"name": "CVE-2019-9471",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9471"
},
{
"name": "CVE-2019-2220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2220"
},
{
"name": "CVE-2019-9465",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9465"
},
{
"name": "CVE-2018-11980",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11980"
},
{
"name": "CVE-2019-10598",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10598"
},
{
"name": "CVE-2019-10482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10482"
},
{
"name": "CVE-2019-9469",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9469"
},
{
"name": "CVE-2019-15220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15220"
},
{
"name": "CVE-2019-10481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10481"
},
{
"name": "CVE-2019-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2217"
},
{
"name": "CVE-2019-2225",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2225"
},
{
"name": "CVE-2019-9472",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9472"
},
{
"name": "CVE-2019-2222",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2222"
},
{
"name": "CVE-2019-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2231"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-10536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10536"
},
{
"name": "CVE-2019-9470",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9470"
},
{
"name": "CVE-2019-10513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10513"
},
{
"name": "CVE-2019-2218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2218"
},
{
"name": "CVE-2019-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2230"
},
{
"name": "CVE-2019-10607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10607"
},
{
"name": "CVE-2018-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20961"
},
{
"name": "CVE-2019-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10487"
},
{
"name": "CVE-2019-2274",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2274"
},
{
"name": "CVE-2017-18595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18595"
},
{
"name": "CVE-2019-10600",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10600"
},
{
"name": "CVE-2019-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2232"
},
{
"name": "CVE-2019-2224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2224"
},
{
"name": "CVE-2019-2223",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2223"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-601",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-12-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 02 d\u00e9cembre 2019",
"url": "https://source.android.com/security/bulletin/2019-12-01.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel du 02 d\u00e9cembre 2019",
"url": "https://source.android.com/security/bulletin/pixel/2019-12-01"
}
]
}
CERTFR-2021-AVI-337
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans le correctif du 5 mai 2021",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-0485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0485"
},
{
"name": "CVE-2021-0484",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0484"
},
{
"name": "CVE-2021-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0466"
},
{
"name": "CVE-2020-11279",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11279"
},
{
"name": "CVE-2021-0324",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0324"
},
{
"name": "CVE-2021-1905",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1905"
},
{
"name": "CVE-2021-0473",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0473"
},
{
"name": "CVE-2020-29661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"name": "CVE-2020-27786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27786"
},
{
"name": "CVE-2021-0491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0491"
},
{
"name": "CVE-2021-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0495"
},
{
"name": "CVE-2021-1910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1910"
},
{
"name": "CVE-2021-0475",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0475"
},
{
"name": "CVE-2021-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0494"
},
{
"name": "CVE-2019-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2219"
},
{
"name": "CVE-2021-0496",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0496"
},
{
"name": "CVE-2020-11289",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11289"
},
{
"name": "CVE-2021-0472",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0472"
},
{
"name": "CVE-2021-0476",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0476"
},
{
"name": "CVE-2020-11285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11285"
},
{
"name": "CVE-2021-28663",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28663"
},
{
"name": "CVE-2021-0498",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0498"
},
{
"name": "CVE-2021-0467",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0467"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2021-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1906"
},
{
"name": "CVE-2020-11295",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11295"
},
{
"name": "CVE-2021-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0480"
},
{
"name": "CVE-2020-11294",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11294"
},
{
"name": "CVE-2020-11284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11284"
},
{
"name": "CVE-2021-28664",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28664"
},
{
"name": "CVE-2021-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0492"
},
{
"name": "CVE-2021-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1927"
},
{
"name": "CVE-2021-0497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0497"
},
{
"name": "CVE-2021-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1891"
},
{
"name": "CVE-2021-0489",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0489"
},
{
"name": "CVE-2021-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0482"
},
{
"name": "CVE-2021-0477",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0477"
},
{
"name": "CVE-2020-11288",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11288"
},
{
"name": "CVE-2021-0474",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0474"
},
{
"name": "CVE-2021-0487",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0487"
},
{
"name": "CVE-2020-11273",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11273"
},
{
"name": "CVE-2020-11293",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11293"
},
{
"name": "CVE-2021-0481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0481"
},
{
"name": "CVE-2021-0493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0493"
},
{
"name": "CVE-2021-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1915"
},
{
"name": "CVE-2021-0490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0490"
},
{
"name": "CVE-2020-11254",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11254"
},
{
"name": "CVE-2020-27825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27825"
},
{
"name": "CVE-2020-11274",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11274"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-337",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-05-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Android. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel 2021-05-01 du 03 mai 2021",
"url": "https://source.android.com/security/bulletin/pixel/2021-05-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android 2021-05-01 du 03 mai 2021",
"url": "https://source.android.com/security/bulletin/2021-05-01"
}
]
}
CERTFR-2019-AVI-601
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Google Android toutes versions sans le correctif du 02 d\u00e9cembre 2019",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-10516",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10516"
},
{
"name": "CVE-2019-10605",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10605"
},
{
"name": "CVE-2019-10595",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10595"
},
{
"name": "CVE-2017-18379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18379"
},
{
"name": "CVE-2019-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2226"
},
{
"name": "CVE-2019-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2242"
},
{
"name": "CVE-2019-10517",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10517"
},
{
"name": "CVE-2019-2221",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2221"
},
{
"name": "CVE-2019-9464",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9464"
},
{
"name": "CVE-2019-10557",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10557"
},
{
"name": "CVE-2019-2229",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2229"
},
{
"name": "CVE-2019-10525",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10525"
},
{
"name": "CVE-2019-10601",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10601"
},
{
"name": "CVE-2019-2228",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2228"
},
{
"name": "CVE-2019-10537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10537"
},
{
"name": "CVE-2019-9468",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9468"
},
{
"name": "CVE-2019-2227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2227"
},
{
"name": "CVE-2019-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2219"
},
{
"name": "CVE-2019-10480",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10480"
},
{
"name": "CVE-2019-10500",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10500"
},
{
"name": "CVE-2019-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2304"
},
{
"name": "CVE-2019-9471",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9471"
},
{
"name": "CVE-2019-2220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2220"
},
{
"name": "CVE-2019-9465",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9465"
},
{
"name": "CVE-2018-11980",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11980"
},
{
"name": "CVE-2019-10598",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10598"
},
{
"name": "CVE-2019-10482",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10482"
},
{
"name": "CVE-2019-9469",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9469"
},
{
"name": "CVE-2019-15220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15220"
},
{
"name": "CVE-2019-10481",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10481"
},
{
"name": "CVE-2019-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2217"
},
{
"name": "CVE-2019-2225",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2225"
},
{
"name": "CVE-2019-9472",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9472"
},
{
"name": "CVE-2019-2222",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2222"
},
{
"name": "CVE-2019-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2231"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-10536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10536"
},
{
"name": "CVE-2019-9470",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9470"
},
{
"name": "CVE-2019-10513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10513"
},
{
"name": "CVE-2019-2218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2218"
},
{
"name": "CVE-2019-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2230"
},
{
"name": "CVE-2019-10607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10607"
},
{
"name": "CVE-2018-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20961"
},
{
"name": "CVE-2019-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10487"
},
{
"name": "CVE-2019-2274",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2274"
},
{
"name": "CVE-2017-18595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18595"
},
{
"name": "CVE-2019-10600",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10600"
},
{
"name": "CVE-2019-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2232"
},
{
"name": "CVE-2019-2224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2224"
},
{
"name": "CVE-2019-2223",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2223"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-601",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-12-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 02 d\u00e9cembre 2019",
"url": "https://source.android.com/security/bulletin/2019-12-01.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel du 02 d\u00e9cembre 2019",
"url": "https://source.android.com/security/bulletin/pixel/2019-12-01"
}
]
}
CERTFR-2020-AVI-331
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Google Android. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Android toutes versions sans le correctif de s\u00e9curit\u00e9 du 01 juin 2020",
"product": {
"name": "Android",
"vendor": {
"name": "Google",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-0197",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0197"
},
{
"name": "CVE-2020-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0176"
},
{
"name": "CVE-2019-13135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13135"
},
{
"name": "CVE-2020-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0165"
},
{
"name": "CVE-2020-0120",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0120"
},
{
"name": "CVE-2019-19529",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19529"
},
{
"name": "CVE-2020-0137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0137"
},
{
"name": "CVE-2020-0206",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0206"
},
{
"name": "CVE-2020-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0216"
},
{
"name": "CVE-2020-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0204"
},
{
"name": "CVE-2020-0177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0177"
},
{
"name": "CVE-2020-0194",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0194"
},
{
"name": "CVE-2020-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0095"
},
{
"name": "CVE-2020-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3660"
},
{
"name": "CVE-2020-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0212"
},
{
"name": "CVE-2020-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3658"
},
{
"name": "CVE-2020-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0153"
},
{
"name": "CVE-2020-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0211"
},
{
"name": "CVE-2020-0234",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0234"
},
{
"name": "CVE-2020-3661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3661"
},
{
"name": "CVE-2020-0199",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0199"
},
{
"name": "CVE-2020-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0210"
},
{
"name": "CVE-2020-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0161"
},
{
"name": "CVE-2017-9704",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9704"
},
{
"name": "CVE-2020-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0168"
},
{
"name": "CVE-2019-10501",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10501"
},
{
"name": "CVE-2019-19543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
},
{
"name": "CVE-2019-10626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10626"
},
{
"name": "CVE-2020-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0144"
},
{
"name": "CVE-2020-0233",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0233"
},
{
"name": "CVE-2020-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0160"
},
{
"name": "CVE-2019-19526",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19526"
},
{
"name": "CVE-2020-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0187"
},
{
"name": "CVE-2020-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0167"
},
{
"name": "CVE-2020-0118",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0118"
},
{
"name": "CVE-2020-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0179"
},
{
"name": "CVE-2020-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3614"
},
{
"name": "CVE-2020-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0145"
},
{
"name": "CVE-2020-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0171"
},
{
"name": "CVE-2020-3642",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3642"
},
{
"name": "CVE-2020-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0151"
},
{
"name": "CVE-2020-0185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0185"
},
{
"name": "CVE-2020-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0115"
},
{
"name": "CVE-2020-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0147"
},
{
"name": "CVE-2020-0113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0113"
},
{
"name": "CVE-2019-19071",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19071"
},
{
"name": "CVE-2020-0141",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0141"
},
{
"name": "CVE-2019-18683",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18683"
},
{
"name": "CVE-2020-0133",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0133"
},
{
"name": "CVE-2020-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0140"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2020-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0131"
},
{
"name": "CVE-2020-3662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3662"
},
{
"name": "CVE-2020-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0139"
},
{
"name": "CVE-2020-0143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0143"
},
{
"name": "CVE-2020-0136",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0136"
},
{
"name": "CVE-2020-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0169"
},
{
"name": "CVE-2020-0186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0186"
},
{
"name": "CVE-2020-0132",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0132"
},
{
"name": "CVE-2020-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0149"
},
{
"name": "CVE-2019-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2219"
},
{
"name": "CVE-2020-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0172"
},
{
"name": "CVE-2020-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0156"
},
{
"name": "CVE-2020-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0158"
},
{
"name": "CVE-2020-3676",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3676"
},
{
"name": "CVE-2020-0124",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0124"
},
{
"name": "CVE-2020-0203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0203"
},
{
"name": "CVE-2020-0142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0142"
},
{
"name": "CVE-2020-8648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8648"
},
{
"name": "CVE-2020-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3635"
},
{
"name": "CVE-2020-0232",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0232"
},
{
"name": "CVE-2020-0116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0116"
},
{
"name": "CVE-2020-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0215"
},
{
"name": "CVE-2020-8428",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8428"
},
{
"name": "CVE-2020-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0154"
},
{
"name": "CVE-2020-0134",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0134"
},
{
"name": "CVE-2020-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0164"
},
{
"name": "CVE-2019-14080",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14080"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2020-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0155"
},
{
"name": "CVE-2020-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0217"
},
{
"name": "CVE-2020-0163",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0163"
},
{
"name": "CVE-2020-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0170"
},
{
"name": "CVE-2020-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0114"
},
{
"name": "CVE-2020-0235",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0235"
},
{
"name": "CVE-2020-0191",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0191"
},
{
"name": "CVE-2020-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0188"
},
{
"name": "CVE-2019-14092",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14092"
},
{
"name": "CVE-2020-0127",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0127"
},
{
"name": "CVE-2020-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0213"
},
{
"name": "CVE-2020-0196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0196"
},
{
"name": "CVE-2020-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0193"
},
{
"name": "CVE-2020-0126",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0126"
},
{
"name": "CVE-2020-0121",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0121"
},
{
"name": "CVE-2019-10597",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10597"
},
{
"name": "CVE-2019-14076",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14076"
},
{
"name": "CVE-2020-0181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0181"
},
{
"name": "CVE-2020-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0135"
},
{
"name": "CVE-2019-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14062"
},
{
"name": "CVE-2020-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0183"
},
{
"name": "CVE-2020-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0117"
},
{
"name": "CVE-2020-3628",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3628"
},
{
"name": "CVE-2020-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0148"
},
{
"name": "CVE-2020-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0166"
},
{
"name": "CVE-2019-14073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14073"
},
{
"name": "CVE-2020-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0208"
},
{
"name": "CVE-2020-0162",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0162"
},
{
"name": "CVE-2019-14047",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14047"
},
{
"name": "CVE-2020-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0207"
},
{
"name": "CVE-2019-9460",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9460"
},
{
"name": "CVE-2020-0200",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0200"
},
{
"name": "CVE-2020-0190",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0190"
},
{
"name": "CVE-2019-14094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14094"
},
{
"name": "CVE-2020-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0173"
},
{
"name": "CVE-2020-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0152"
},
{
"name": "CVE-2020-0138",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0138"
},
{
"name": "CVE-2020-0195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0195"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0128"
},
{
"name": "CVE-2020-0219",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0219"
},
{
"name": "CVE-2020-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0184"
},
{
"name": "CVE-2020-0223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0223"
},
{
"name": "CVE-2020-0180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0180"
},
{
"name": "CVE-2020-0125",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0125"
},
{
"name": "CVE-2020-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0209"
},
{
"name": "CVE-2020-0198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0198"
},
{
"name": "CVE-2019-18786",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18786"
},
{
"name": "CVE-2020-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0119"
},
{
"name": "CVE-2020-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0175"
},
{
"name": "CVE-2020-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0129"
},
{
"name": "CVE-2020-8597",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8597"
},
{
"name": "CVE-2019-16275",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16275"
},
{
"name": "CVE-2020-3665",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3665"
},
{
"name": "CVE-2020-0182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0182"
},
{
"name": "CVE-2020-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0205"
},
{
"name": "CVE-2020-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3626"
},
{
"name": "CVE-2020-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0192"
},
{
"name": "CVE-2019-14091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14091"
},
{
"name": "CVE-2020-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0150"
},
{
"name": "CVE-2020-0189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0189"
},
{
"name": "CVE-2020-0178",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0178"
},
{
"name": "CVE-2020-0202",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0202"
},
{
"name": "CVE-2020-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0157"
},
{
"name": "CVE-2020-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0146"
},
{
"name": "CVE-2020-3663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3663"
},
{
"name": "CVE-2020-0214",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0214"
},
{
"name": "CVE-2020-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0174"
},
{
"name": "CVE-2020-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0159"
},
{
"name": "CVE-2020-0218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0218"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2020-0201",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0201"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-331",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-06-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Google Android.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Android du 01 juin 2020",
"url": "https://source.android.com/security/bulletin/2020-06-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Pixel du 01 juin 2020",
"url": "https://source.android.com/security/bulletin/pixel/2020-06-01"
}
]
}
CNVD-2019-44271
Vulnerability from cnvd - Published: 2019-12-06目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://source.android.google.cn/security/bulletin/2019-12-01.html
| Name | ['Google Android 9', 'Google Android 10'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-2219",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2019-2219"
}
},
"description": "Android\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u548c\u5f00\u653e\u624b\u6301\u8bbe\u5907\u8054\u76df\uff08\u7b80\u79f0OHA\uff09\u7684\u4e00\u5957\u4ee5Linux\u4e3a\u57fa\u7840\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002Framework\u662f\u5176\u4e2d\u7684\u4e00\u4e2aAndroid\u6846\u67b6\u7ec4\u4ef6\u3002\n\nGoogle Android 10\u7248\u672c\u548c9\u7248\u672c\u4e2d\u7684Framework\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u6076\u610f\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u9694\u79bb\u4f20\u611f\u5668\u6570\u636e\u7684\u64cd\u4f5c\u7cfb\u7edf\u4fdd\u62a4\uff0c\u6cc4\u9732\u4fe1\u606f\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://source.android.google.cn/security/bulletin/2019-12-01.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-44271",
"openTime": "2019-12-06",
"patchDescription": "Android\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u548c\u5f00\u653e\u624b\u6301\u8bbe\u5907\u8054\u76df\uff08\u7b80\u79f0OHA\uff09\u7684\u4e00\u5957\u4ee5Linux\u4e3a\u57fa\u7840\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002Framework\u662f\u5176\u4e2d\u7684\u4e00\u4e2aAndroid\u6846\u67b6\u7ec4\u4ef6\u3002\r\n\r\nGoogle Android 10\u7248\u672c\u548c9\u7248\u672c\u4e2d\u7684Framework\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u6076\u610f\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u9694\u79bb\u4f20\u611f\u5668\u6570\u636e\u7684\u64cd\u4f5c\u7cfb\u7edf\u4fdd\u62a4\uff0c\u6cc4\u9732\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Google Android Framework\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2019-44271\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Google Android 9",
"Google Android 10"
]
},
"referenceLink": "https://source.android.google.cn/security/bulletin/2019-12-01.html",
"serverity": "\u4e2d",
"submitTime": "2019-12-05",
"title": "Google Android Framework\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2019-44271\uff09"
}
FKIE_CVE-2019-2219
Vulnerability from fkie_nvd - Published: 2019-12-06 23:15 - Updated: 2024-11-21 04:40{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D558D965-FA70-4822-A770-419E73BA9ED3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In several functions of NotificationManagerService.java and related files, there is a possible way to record audio from the background without notification to the user due to a permission bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119041698"
},
{
"lang": "es",
"value": "En varias funciones de NotificationManagerService.java y archivos relacionados, existe una posible forma de grabar audio desde el fondo sin notificar al usuario debido a un bypass de permisos. Esto podr\u00eda llevar a una escalada local de privilegios con necesidad de privilegios de ejecuci\u00f3n de usuario. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n.Producto: AndroidVersiones: Android-11Android ID: A-119041698"
}
],
"id": "CVE-2019-2219",
"lastModified": "2024-11-21T04:40:27.583",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-12-06T23:15:11.990",
"references": [
{
"source": "security@android.com",
"url": "https://source.android.com/security/bulletin/2021-05-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://source.android.com/security/bulletin/2021-05-01"
}
],
"sourceIdentifier": "security@android.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2019-2219
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-2219",
"description": "In several functions of NotificationManagerService.java and related files, there is a possible way to record audio from the background without notification to the user due to a permission bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119041698",
"id": "GSD-2019-2219"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-2219"
],
"details": "In several functions of NotificationManagerService.java and related files, there is a possible way to record audio from the background without notification to the user due to a permission bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119041698",
"id": "GSD-2019-2219",
"modified": "2023-12-13T01:23:45.500656Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@android.com",
"ID": "CVE-2019-2219",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_value": "Android-11"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In several functions of NotificationManagerService.java and related files, there is a possible way to record audio from the background without notification to the user due to a permission bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119041698"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://source.android.com/security/bulletin/2021-05-01",
"refsource": "MISC",
"url": "https://source.android.com/security/bulletin/2021-05-01"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@android.com",
"ID": "CVE-2019-2219"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In several functions of NotificationManagerService.java and related files, there is a possible way to record audio from the background without notification to the user due to a permission bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119041698"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://source.android.com/security/bulletin/2021-05-01",
"refsource": "MISC",
"tags": [],
"url": "https://source.android.com/security/bulletin/2021-05-01"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-06-21T14:15Z",
"publishedDate": "2019-12-06T23:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.