The Jumio SDK before 1.5.0 for Android might allow attackers to execute arbitrary code by leveraging a finalize method in a Serializable class that improperly passes an attacker-controlled pointer to a native function.
The product does not restrict or incorrectly restricts operations within the boundaries of a resource that is accessed using an index or pointer, such as memory or files.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Jumio_sdk | Jumio | * | 1.5.0 (excluding) |