The Samsung Qmage codec used in the Android Skia library does not properly validate image files. A number of memory corruption vulnerabilities allow an attacker to execute arbitrary code by causing a vulnerable system to parse a Qmage file.
The Samsung May 2020 Android Security Update notes that "a possible memory overwrite vulnerability in Quram qmg library allows possible remote arbitrary code execution." Samsung identifies this vulnerability as SVE-2020-16747, more commonly known as CVE-2020-8899. Google Project Zero performed extensive fuzz testing on the Qmage (or Quram, or qmg) code that Samsung added to the Android Skia library and identified 5218 uniquely crashing test cases. At least one of these memory corruption vulnerabilities can be exploited by sending a specially crafted MMS message to a vulnerable system.
Samsung notes that versions O(8.X), P(9.0), Q(10.0) are affected.
Exploitation of this vulnerability permits a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Apply an update
This vulnerability was published by Mateusz Jurczyk at Google Project Zero.
This document was written by Eric Hatleback.
|Date First Published:||2020-05-14|
|Date Last Updated:||2020-05-15 14:53 UTC|