The Jumio SDK before 1.5.0 for Android might allow attackers to execute arbitrary code by leveraging a finalize method in a Serializable class that improperly passes an attacker-controlled pointer to a native function.
The product does not restrict or incorrectly restricts operations within the boundaries of a resource that is accessed using an index or pointer, such as memory or files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Jumio_sdk | Jumio | * | 1.5.0 (excluding) |