The MyScript SDK before 1.3 for Android might allow attackers to execute arbitrary code by leveraging a finalize method in a Serializable class that improperly passes an attacker-controlled pointer to a native function.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdf | third party advisory exploit |
https://alephsecurity.com/vulns/aleph-2015006 | third party advisory |