Apple's advisory warns that the audio vulnerabilities could have
enabled arbitrary code execution if a user attempted to process a maliciously crafted audio file.
Not exact matches
They successfully demonstrated how
arbitrary data can be injected into a digital currency decentralized database simply by using an exploit
code that opens a notepad
enabling corrupted
«The most severe of these issues is a critical security vulnerability in Media framework that could
enable a remote attacker using a specially crafted file to execute
arbitrary code within the context of a privileged process.
«The most severe of these issues is a critical security vulnerability in Media framework that could
enable a remote attacker using a specially crafted file to execute
arbitrary code within the context of a privileged process,» said Google.
Google notes, «the most severe of the issues is a critical security vulnerability in the Media framework that could
enable a remote attacker using a specially crafted file to execute
arbitrary code...»
The worst one «could
enable a remote attacker using a specially crafted file to execute
arbitrary code within the context of a privileged process», according to Google's September 2017 Android Security Bulletin.