First published: Mon Jul 02 2018(Updated: )
In smp_data_received of smp_l2c.cc, there is a possible out of bounds read followed by code execution due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =6.0 | |
Android | =6.0.1 | |
Android | =7.0 | |
Android | =7.1.1 | |
Android | =7.1.2 | |
Android | =8.0 | |
Android | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9365 is classified as a critical vulnerability that can lead to remote code execution.
To fix CVE-2018-9365, users should update their Android devices to the latest security patch provided by Google.
CVE-2018-9365 affects Android versions 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, and 8.1.
CVE-2018-9365 facilitates remote code execution attacks requiring user interaction.
The vulnerability in CVE-2018-9365 is found in the smp_data_received function of smp_l2c.cc.