First published: Mon Apr 01 2019(Updated: )
In numerous hand-crafted functions in libmpeg2, NEON registers are not preserved. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-120644655.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =7.0 | |
Google Android | =7.1.1 | |
Google Android | =7.1.2 | |
Google Android | =8.0 | |
Google Android | =8.1 | |
Google Android | =9.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2028 has a high severity rating due to its potential for remote code execution.
To mitigate CVE-2019-2028, update your device to the latest Android version or apply available security patches.
CVE-2019-2028 affects Android versions 7.0, 7.1.1, 7.1.2, 8.0, 8.1, and 9.0.
Yes, exploitation of CVE-2019-2028 requires user interaction.
CVE-2019-2028 vulnerabilities reside in the libmpeg2 library functions related to NEON register handling.