Android Mitigation Bypass

Discussion in 'News Aggregator' started by Packet Storm, 2 Dec 2016.

  1. Packet Storm

    Packet Storm Guest

    Because of a design bug in IOMX, the user-supplied sizes in the GET_PARAMETER and SET_PARAMETER calls ar e discarded before calling in to the responsible OMX code-paths. This has led to a variety of overflow-type bugs.

    Continue reading...
     

Share This Page

Loading...