
Cloud Vulnerability DB
A community-led vulnerabilities database
In the xmlSnprintfElementContent function of valid.c, there is a possible out of bounds write vulnerability that could lead to remote escalation of privilege in an unprivileged app with no additional execution privileges needed. User interaction is required for exploitation. This vulnerability affects Android versions 7.0, 7.1.1, 7.1.2, 8.0, 8.1 (Android Bulletin).
The vulnerability exists in the Android Runtime component and is classified as a Remote Code Execution (RCE) vulnerability with High severity. The issue specifically affects the xmlSnprintfElementContent function in valid.c, which could allow an out of bounds write condition (CVE Mitre).
If exploited, this vulnerability could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of an application that uses the library. The vulnerability has been rated as High severity due to its potential impact on affected Android devices (Android Bulletin).
The vulnerability was addressed in the Android security patch level 2018-09-01. Users are advised to update their Android devices to a security patch level of 2018-09-01 or later to address this issue (Android Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."