Vulnerability Description
In TrustZone access control policy may potentially be bypassed in all Android releases from CAF using the Linux kernel due to improper input validation an integer overflow vulnerability leading to a buffer overflow could potentially occur and a buffer over-read vulnerability could potentially occur.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | All versions |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97334Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038201
- https://source.android.com/security/bulletin/2017-04-01PatchVendor Advisory
- http://www.securityfocus.com/bid/97334Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038201
- https://source.android.com/security/bulletin/2017-04-01PatchVendor Advisory
FAQ
What is CVE-2016-10239?
CVE-2016-10239 is a vulnerability with a CVSS score of 7.8 (HIGH). In TrustZone access control policy may potentially be bypassed in all Android releases from CAF using the Linux kernel due to improper input validation an integer overflow vulnerability leading to a b...
How severe is CVE-2016-10239?
CVE-2016-10239 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10239?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.