Google Android Operating System < 5.1.0 Multiple Vulnerabilities

Critical Nessus Network Monitor Plugin ID 8666


The remote device is affected by multiple vulnerabilities.


The Google Android operating system prior to 5.1.0 is affected by the following vulnerabilities

- An overflow condition in the 'print_option()' function of the DHCP client daemon 'dhcp.c' is triggered when handling DHCP options. With a specially crafted ACK packet response, a context-dependent attacker can execute arbitrary code. (CVE-2014-7913)
- There is an integer overflow conditions in the 'GraphicBuffer::unflatten()' function in 'platform/frameworks/native/libs/ui/GraphicBuffer.cpp' related to a large number of file descriptors or integer values. This may allow a malicious application to corrupt memory, causing a crash or potentially executing code with escalated privileges. (CVE-2015-1474)
- There is an integer overflow condition in the 'BnAudioPolicyService::onTransact()' function in 'IAudioPolicyService.cpp'. The issue is triggered as user-supplied input is not properly validated when handling a bound array size. This may allow a local attacker to cause a buffer overflow, resulting in a denial of service or potentially execution of arbitrary code. (CVE-2015-1530)


Upgrade to Google Android operating system version 5.1.0 or later.

See Also

Plugin Details

Severity: Critical

ID: 8666

File Name: 8666.prm

Published: 2015/04/10

Modified: 2016/01/19

Dependencies: 5287

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C


Base Score: 9.8

Temporal Score: 8.8


Temporal Vector: CVSS3#E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:google:android

Patch Publication Date: 2014/07/09

Vulnerability Publication Date: 2015/03/11

Reference Information

CVE: CVE-2014-7913, CVE-2015-1474, CVE-2015-1530

BID: 72788, 73048, 76100