he vulnerability is to delete arbitrary files in LGInstallService ("com.lge.lginstallservies") app. The app contains the exported "com.lge.lginstallservies.InstallService" service that exposes an AIDL interface. All its "installPackage*" methods are finally calling the "installPackageVerify()" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted.
References
Link | Resource |
---|---|
https://lgsecurity.lge.com/bulletins/mobile#updateDetails | Vendor Advisory |
https://lgsecurity.lge.com/bulletins/mobile#updateDetails | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:25
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-27 15:19
Updated : 2024-11-21 08:25
NVD link : CVE-2023-44128
Mitre link : CVE-2023-44128
CVE.ORG link : CVE-2023-44128
JSON object : View
Products Affected
- android
lg
- v60_thin_q_5g
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition