Description
Heap-based buffer overflow in the GIF library in the WebKit framework for Google Android SDK m3-rc37a and earlier allows remote attackers to execute arbitrary code via a crafted GIF file whose logical screen height and width are different than the actual height and width.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Alfredo Ortega · pythondosandroid
https://www.exploit-db.com/exploits/31307
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/40998
Various Sources x_refsource_misc
http://www.coresecurity.com/?action=item&id=2148
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3727
Patch x_refsource_confirm
http://android-developers.blogspot.com/2008/03/android-sdk-update-m5-rc15-released.html
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28005
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/489135/100/0/threaded
Scores
EPSS
0.1553
EPSS Percentile
94.7%
Details
CWE
CWE-119
Status
published
Products (1)
google/android_sdk
m3-rc37a
Published
Mar 06, 2008
Tracked Since
Feb 18, 2026