First published: Fri Jun 19 2015(Updated: )
Directory traversal vulnerability in the SwiftKey language-pack update implementation on Samsung Galaxy S4, S4 Mini, S5, and S6 devices allows remote web servers to write to arbitrary files, and consequently execute arbitrary code in a privileged context, by leveraging control of the skslm.swiftkey.net domain name and providing a .. (dot dot) in an entry in a ZIP archive, as demonstrated by a traversal to the /data/dalvik-cache directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SwiftKey | ||
Samsung Galaxy S4 | ||
Samsung Galaxy S4 mini LTE | ||
Samsung Galaxy S5 Firmware | ||
Samsung Galaxy S6 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4641 has a high severity rating due to its potential to allow remote code execution.
To fix CVE-2015-4641, ensure that your SwiftKey app is updated to the latest version that addresses this vulnerability.
CVE-2015-4641 affects Samsung Galaxy S4, S4 Mini, S5, and S6 devices using SwiftKey.
CVE-2015-4641 is a directory traversal vulnerability that allows unauthorized access to system files.
Yes, CVE-2015-4641 can potentially lead to data breaches by allowing remote attackers to execute arbitrary code.