[CNNVD]Open Handset Alliance Android 远程DNS缓存投毒漏洞--Android是Google通过Open Handset Alliance发起的项目，用于为移动设备提供完整的软件集，包括操作系统、中间件等。
Open Handset Alliance Android中存在远程DNS缓存投毒漏洞。攻击者可利用该漏洞从合法网站转移数据到攻击者指定的站点，成功的利用将...
Android contains a flaw that is triggered when the built in factory reset feature fails to properly remove all information from the system, when ran from either the recovery console or inside. This may allow a physically present attacker to gain access to potentially sensitive information from a locked device, by first performing a factory reset and then recovering the information.
The Google Android contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is due to an unspecified issue, allowing a context-dependent attacker to gain access to the device with root privileges.
Android is prone to an overflow condition. The vold daemon fails to properly sanitize user-supplied input when parsing specially crafted FrameworkCommands, causing a stack based buffer overflow. When the overflow occurs, the exploit returns to a chain of Return Oriented Exploitation (ROP) gaddgets that execute as root, escalating the attacker's privileges.