First published: Fri Aug 05 2016(Updated: )
The framework APIs in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 do not ensure that package data originated from the Package Manager, which allows attackers to bypass an unspecified protection mechanism via a crafted application, aka internal bug 28795098.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =4.0 | |
Android | =4.0.1 | |
Android | =4.0.2 | |
Android | =4.0.3 | |
Android | =4.0.4 | |
Android | =4.1 | |
Android | =4.1.2 | |
Android | =4.2 | |
Android | =4.2.1 | |
Android | =4.2.2 | |
Android | =4.3 | |
Android | =4.3.1 | |
Android | =4.4 | |
Android | =4.4.1 | |
Android | =4.4.2 | |
Android | =4.4.3 | |
Android | =5.0 | |
Android | =5.0.1 | |
Android | =5.1 | |
Android | =5.1.0 | |
Android | =6.0 | |
Android | =6.0.1 |
https://android.googlesource.com/platform/frameworks/base/+/e7cf91a198de995c7440b3b64352effd2e309906
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3832 is classified as a medium severity vulnerability due to the potential for attackers to bypass protection mechanisms.
To fix CVE-2016-3832, users should upgrade their Android device to versions 4.4.4, 5.0.2, 5.1.1, or any version 6.x released after August 1, 2016.
CVE-2016-3832 affects Android 4.x versions before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before the August 2016 security update.
CVE-2016-3832 allows attackers to potentially bypass unspecified protection mechanisms by exploiting crafted applications.
There are no known effective workarounds for CVE-2016-3832, and upgrading the Android system is the recommended approach.