Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2015-7891 CVE-2016-4546 CVE-2016-9277 |
CWE-ID | CWE-362 CWE-20 CWE-190 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
Samsung Mobile Mobile applications / Mobile firmware & hardware |
Vendor | Samsung |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU38609
Risk: Low
CVSSv3.1: 6.3 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2015-7891
Exploit availability: Yes
DescriptionThe vulnerability allows a local authenticated user to execute arbitrary code.
Race condition in the ioctl implementation in the Samsung Graphics 2D driver (aka /dev/fimg2d) in Samsung devices with Android L(5.0/5.1) allows local users to trigger memory errors by leveraging definition of g2d_lock and g2d_unlock lock macros as no-ops, aka SVE-2015-4598.
MitigationInstall update from vendor's website.
Vulnerable software versionsSamsung Mobile: 5.0 - 5.1
External linkshttp://packetstormsecurity.com/files/134107/Samsung-Fimg2d-FIMG2D_BITBLT_BLIT-Ioctl-Concurrency-Flaw.html
http://security.samsungmobile.com/smrupdate.html#SMR-OCT-2015
http://www.securityfocus.com/bid/77335
http://bugs.chromium.org/p/project-zero/issues/detail?id=492
http://www.exploit-db.com/exploits/38557/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU39663
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-4546
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.
Samsung devices with Android KK(4.4) or L(5.0/5.1) allow local users to cause a denial of service (IAndroidShm service crash) via crafted data in a service call.
MitigationInstall update from vendor's website.
Vulnerable software versionsSamsung Mobile: 4.4 - 5.1
External linkshttp://security.samsungmobile.com/smrupdate.html#SMR-JAN-2016
http://www.openwall.com/lists/oss-security/2016/05/06/1
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU40047
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2016-9277
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Integer overflow in SystemUI in KK(4.4) and L(5.0/5.1) on Samsung Note devices allows attackers to cause a denial of service (UI restart) via vectors involving APIs and an activity that computes an out-of-bounds array index, aka SVE-2016-6906.
MitigationInstall update from vendor's website.
Vulnerable software versionsSamsung Mobile: 4.4 - 5.1
External linkshttp://security.samsungmobile.com/smrupdate.html#SMR-NOV-2016
http://www.securityfocus.com/bid/94292
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.