In Source of ZipFile.java, there is a possible way for an attacker to execute arbitrary code by manipulating Dynamic Code Loading due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://android.googlesource.com/platform/libcore/+/b17fd2f8fe468e7d32e713b442f610cd33e4e7a9 | Product |
https://source.android.com/security/bulletin/2024-10-01 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Apr 2025, 02:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* |
|
First Time |
Google android
|
|
References | () https://source.android.com/security/bulletin/2024-10-01 - Vendor Advisory | |
References | () https://android.googlesource.com/platform/libcore/+/b17fd2f8fe468e7d32e713b442f610cd33e4e7a9 - Product |
28 Jan 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-28 20:15
Updated : 2025-04-18 02:13
NVD link : CVE-2024-40673
Mitre link : CVE-2024-40673
JSON object : View
Products Affected
- android
CWE
No CWE.