First published: Mon May 03 2021(Updated: )
In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-177611958
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =8.1 | |
Android | =9.0 | |
Android | =10.0 | |
Android | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-0474 has a high severity rating due to its potential for remote code execution.
To fix CVE-2021-0474, users should update their Android devices to the latest version where the vulnerability has been patched.
CVE-2021-0474 affects Android versions 8.1, 9.0, 10.0, and 11.0.
No, user interaction is not required to exploit CVE-2021-0474, making it potentially more dangerous.
CVE-2021-0474 is classified as a heap buffer overflow vulnerability.