First published: Sun Feb 07 2016(Updated: )
The get_build_id function in elf_utils.cpp in Debuggerd in Android 6.x before 2016-02-01 allows attackers to gain privileges via a crafted application that mishandles a Desc Size element in an ELF Note, aka internal bug 25187394.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =6.0 | |
Google Android | =6.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0807 is classified as a high-severity vulnerability due to its potential for privilege escalation.
To resolve CVE-2016-0807, update your device to Android version 6.0.1 or later, as patches are included in that release.
Applications that mishandle the Desc Size element in an ELF Note are particularly vulnerable to CVE-2016-0807.
CVE-2016-0807 requires a crafted application to exploit, making it dependent on user interaction to install the malicious app.
The impact of CVE-2016-0807 allows attackers to gain elevated privileges on vulnerable Android devices.