Vulnerability Description
The sockets subsystem in Android 6.x before 2016-07-01 allows attackers to bypass intended system-call restrictions via a crafted application that makes an ioctl call, aka internal bug 28171804.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | 6.0 |
Related Weaknesses (CWE)
References
- http://source.android.com/security/bulletin/2016-07-01.htmlVendor Advisory
- https://android.googlesource.com/platform/external/sepolicy/+/556bb0f55324e8839d
- http://source.android.com/security/bulletin/2016-07-01.htmlVendor Advisory
- https://android.googlesource.com/platform/external/sepolicy/+/556bb0f55324e8839d
FAQ
What is CVE-2016-3748?
CVE-2016-3748 is a vulnerability with a CVSS score of 8.4 (HIGH). The sockets subsystem in Android 6.x before 2016-07-01 allows attackers to bypass intended system-call restrictions via a crafted application that makes an ioctl call, aka internal bug 28171804.
How severe is CVE-2016-3748?
CVE-2016-3748 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3748?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.