Integer overflow in the BMP::readFromStream method in the libsgl.so library in Google Android SDK m3-rc37a and earlier, and m5-rc14, allows remote attackers to execute arbitrary code via a crafted BMP file with a header containing a negative offset field.
- http://securityreason.com/securityalert/3727
- http://www.coresecurity.com/?action=item&id=2148
No PoCs found on GitHub currently.