A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html
http://seclists.org/fulldisclosure/2019/Oct/38
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20191030-01-binder-en
Source: MITRE
Published: 2019-10-11
Updated: 2019-10-18
Type: CWE-416
Base Score: 4.6
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 3.9
Severity: MEDIUM
Base Score: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH