MMS Exploit Part 3: Constructing the Memory Corruption Primitives
Tags
attack-pattern: | Data Direct Indirect Model Exploits - T1587.004 Exploits - T1588.005 Hardware - T1592.001 Javascript - T1059.007 Software - T1592.002 Vulnerabilities - T1588.006 |
Common Information
Type | Value |
---|---|
UUID | 6b07f763-21db-4033-8dd1-97d5001ac200 |
Fingerprint | ee6b9a51c4248f81 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | July 28, 2020, 12:50 p.m. |
Added to db | Jan. 18, 2023, 9:45 p.m. |
Last updated | Dec. 18, 2024, 10:17 p.m. |
Headline | Project Zero |
Title | MMS Exploit Part 3: Constructing the Memory Corruption Primitives |
Detected Hints/Tags/Attributes | 53/1/9 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 8 | cve-2019-8641 |
|
Details | Domain | 7 | com.samsung.android |
|
Details | Domain | 4 | libhwui.so |
|
Details | Domain | 2 | libqmagedecoder.so |
|
Details | Domain | 1 | cs.android.com |
|
Details | Domain | 4 | android.graphics |
|
Details | File | 1 | samsungmessages_11.apk |
|
Details | File | 1 | bitmap.config |
|
Details | md5 | 1 | e418c0496cb1babf0eba13026f4d1504 |