Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-2427

EPSS 0.08% · P23
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-2427

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The AES-GCM specification in RFC 5084, as used in Android 5.x and 6.x, recommends 12 octets for the aes-ICVlen parameter field, which might make it easier for attackers to defeat a cryptographic protection mechanism and discover an authentication key via a crafted application, aka internal bug 26234568. NOTE: The vendor disputes the existence of this potential issue in Android, stating "This CVE was raised in error: it referred to the authentication tag size in GCM, whose default according to ASN.1 encoding (12 bytes) can lead to vulnerabilities. After careful consideration, it was decided that the insecure default value of 12 bytes was a default only for the encoding and not default anywhere else in Android, and hence no vulnerability existed.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Android Bouncy Castle Crypto APIs for Java 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。Bouncy Castle Crypto APIs for Java是一个用于Java平台且开源的轻量级密码包。 Android的Bouncy Castle Crypto APIs for Java中的asn1/cms/GCMParameters.java文件存在信息泄露漏洞,该漏洞源于程序使用不正确的AES-GCM-ICVlen值。攻击者可借助特制的应用程序利用该漏洞破坏机密保护机
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-2427

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-2427

登录查看更多情报信息。

Same Patch Batch · n/a · 2016-04-18 · 55 CVEs total

CVE-2016-2410Android Qualcomm Video Kernel Driver 提权漏洞
CVE-2016-2425Android AOSP Mail 信息泄露漏洞
CVE-2016-2420Android Debuggerd组件提权漏洞
CVE-2016-2423Android Telephony 提权漏洞
CVE-2016-2422Android Wi-Fi 提权漏洞
CVE-2016-2421Android Setup Wizard 提权漏洞
CVE-2016-2424Android SyncStorageEngine 拒绝服务漏洞
CVE-2016-2413Android Mediaserver 提权漏洞
CVE-2016-2412Android System_server Skia提权漏洞
CVE-2016-2411Android Qualcomm Power Management组件提权漏洞
CVE-2016-2414Android Minikin 拒绝服务漏洞
CVE-2016-2409Android Texas Instruments haptic kernel driver 提权漏洞
CVE-2016-1503dhcpcd 基于堆的缓冲区溢出漏洞
CVE-2016-0850Android Bluetooth 提权漏洞
CVE-2016-0849Android Recovery Procedure 提权漏洞
CVE-2016-0848Android Download Manager 竞争条件漏洞
CVE-2016-0847Android Telecom组件提权漏洞
CVE-2016-0846Android IMemory Native Interface 提权漏洞
CVE-2016-0844Android Qualcomm RF组件提权漏洞
CVE-2016-0843Android Qualcomm Performance组件提权漏洞

Showing top 20 of 55 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2016-2427

No comments yet


Leave a comment