First published: Tue Feb 17 2009(Updated: )
Integer overflow in the showLog function in fake_log_device.c in liblog in Open Handset Alliance Android 1.0 allows attackers to trigger a buffer overflow and possibly have unspecified other impact by sending a large number of input lines.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Android SDK | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0608 has a significant severity level due to its potential for triggering a buffer overflow.
To fix CVE-2009-0608, you should update to a patched version of the Android SDK that addresses this vulnerability.
Exploitation of CVE-2009-0608 can lead to buffer overflow attacks, which may allow attackers to execute arbitrary code or crash the application.
CVE-2009-0608 primarily affects users and developers using Android SDK version 1.0.
CVE-2009-0608 can be exploited by sending a large number of input lines to the showLog function, triggering an integer overflow.