First published: Mon Feb 05 2024(Updated: )
In setParameter of MtpPacket.cpp, there is a possible out of bounds read due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Google Android | =14.0 |
https://android.googlesource.com/platform/frameworks/av/+/2ca6c27dc0336fd98f47cfb96dc514efa98e8864
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0040 is considered a medium severity vulnerability due to its potential for remote information disclosure.
To fix CVE-2024-0040, ensure that your Android version is updated to the latest security patch that addresses this vulnerability.
CVE-2024-0040 affects Google Android versions 11.0, 12.0, 12.1, 13.0, and 14.0.
Yes, CVE-2024-0040 can be exploited without any user interaction required.
CVE-2024-0040 is categorized as a heap buffer overflow, leading to possible out of bounds read.