π΄ Developers Need More Usable Static Code Scanners to Head Off Security Bugs π΄
π Read
via "Dark Reading: ".
As companies "shift left" -- pushing more responsibility for security onto developers -- the tools that are available are falling short, usability researchers say.π Read
via "Dark Reading: ".
Dark Reading
Developers Need More Usable Static Code Scanners to Head Off Security Bugs
As companies shift left -- pushing more responsibility for security onto developers -- the tools that are available are falling short, usability researchers say.
π΄ Microsoft Patches 120 Vulnerabilities, Two Zero-Days π΄
π Read
via "Dark Reading: ".
The August 2020 Patch Tuesday marks the sixth month in a row Microsoft released patches for more than 110 vulnerabilities.π Read
via "Dark Reading: ".
Darkreading
Microsoft Patches 120 Vulnerabilities, Two Zero-Days
The August 2020 Patch Tuesday marks the sixth month in a row Microsoft released patches for more than 110 vulnerabilities.
β Two 0-Days Under Active Attack, Among 120 Bugs Patched by Microsoft β
π Read
via "Threatpost".
One of the two zero-day bugs is rated βcriticalβ and is classified as a remote code-execution bug impacting Microsoftβs Internet Explorer.π Read
via "Threatpost".
Threat Post
Two 0-Days Under Active Attack, Among 120 Bugs Patched by Microsoft
One of the two zero-day bugs is rated βcriticalβ and is classified as a remote code-execution bug impacting Microsoftβs Internet Explorer.
ATENTIONβΌ New - CVE-2020-0260
π Read
via "National Vulnerability Database".
There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152225183π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0259
π Read
via "National Vulnerability Database".
In android_verity_ctr of dm-android-verity.c, there is a possible way to modify a dm-verity protected filesystem due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-157941353References: N/Aπ Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0258
π Read
via "National Vulnerability Database".
In stopZygoteLocked of AppZygote.java, there is an insufficient cleanup. This could lead to local information disclosure in the application that is started next with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-157598956π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0257
π Read
via "National Vulnerability Database".
In SpecializeCommon of com_android_internal_os_Zygote.cpp, there is a permissions bypass due to an incomplete cleanup. This could lead to local escalation of privilege in isolated processes with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-156741968π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0256
π Read
via "National Vulnerability Database".
In LoadPartitionTable of gpt.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege when inserting a malicious USB device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-8.0Android ID: A-152874864π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0254
π Read
via "National Vulnerability Database".
There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152647751π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0253
π Read
via "National Vulnerability Database".
There is a possible memory corruption due to a use after free.Product: AndroidVersions: Android SoCAndroid ID: A-152647365π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0252
π Read
via "National Vulnerability Database".
There is a possible memory corruption due to a use after free.Product: AndroidVersions: Android SoCAndroid ID: A-152236803π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0251
π Read
via "National Vulnerability Database".
There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152647626π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0250
π Read
via "National Vulnerability Database".
In requestCellInfoUpdateInternal of PhoneInterfaceManager.java, there is a missing permission check. This could lead to local information disclosure of location data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-154934934π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0249
π Read
via "National Vulnerability Database".
In postInstantAppNotif of InstantAppNotifier.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1 Android-9Android ID: A-154719656π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0248
π Read
via "National Vulnerability Database".
In postInstantAppNotif of InstantAppNotifier.java, there is a possible permission bypass due to a PendingIntent error. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-154627439π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0247
π Read
via "National Vulnerability Database".
In Threshold::getHistogram of ImageProcessHelper.java, there is a possible crash loop due to an uncaught exception. This could lead to local denial of service with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.0 Android-8.1Android ID: A-156087409π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0243
π Read
via "National Vulnerability Database".
In clearPropValue of MediaAnalyticsItem.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-8.0 Android-8.1Android ID: A-151644303π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0242
π Read
via "National Vulnerability Database".
In reset of NuPlayerDriver.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the media server with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-151643722π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0241
π Read
via "National Vulnerability Database".
In NuPlayerStreamListener of NuPlayerStreamListener.cpp, there is possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-151456667π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0240
π Read
via "National Vulnerability Database".
In NewFixedDoubleArray of factory.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-150706594π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2020-0239
π Read
via "National Vulnerability Database".
In getDocumentMetadata of DocumentsContract.java, there is a possible disclosure of location metadata from a file due to a permissions bypass. This could lead to local information disclosure from a file (eg. a photo) containing location metadata with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10Android ID: A-151095863π Read
via "National Vulnerability Database".