Cyber Posture

CVE-2024-49749

High

Published: 21 January 2025

Published
21 January 2025
Modified
22 April 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0269 86.0th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-49749 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Google Android. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 14.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates identification, reporting, and timely remediation of software flaws like the integer overflow in DGifSlurp, directly preventing exploitation through patches from the Android security bulletin.

prevent

Implements memory protection such as address space randomization and non-executable memory to mitigate remote code execution resulting from the out-of-bounds write.

prevent

Requires validation of untrusted GIF inputs to detect and reject malformed data that could trigger the integer overflow and out-of-bounds write in the library.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.003 Malicious Image Execution
Adversaries may rely on a user running a malicious image to facilitate execution.
Why these techniques?

Out-of-bounds write in GIF processing library directly enables client-side RCE via a crafted malicious image file requiring user interaction.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In DGifSlurp of dgif_lib.c, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

Deeper analysisAI

CVE-2024-49749 is an out-of-bounds write vulnerability stemming from an integer overflow in the DGifSlurp function within dgif_lib.c, a component of the GIF image processing library. This flaw affects Android systems, as detailed in the January 2025 Android security bulletin. The issue carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and is associated with CWE-787 (Out-of-bounds Write), potentially enabling remote code execution without requiring additional execution privileges.

A remote attacker could exploit this vulnerability by supplying a specially crafted GIF file, leading to remote code execution upon processing. Exploitation requires no privileges (PR:N) and low complexity (AC:L) over the network (AV:N), though the CVSS vector indicates user interaction is required (UI:R). Successful exploitation grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged security scope.

The Android security bulletin at https://source.android.com/security/bulletin/2025-01-01 provides details on patches for affected Android versions, recommending users apply the January 2025 security update to mitigate the vulnerability.

Details

CWE(s)

Affected Products

google
android
12.0, 12.1, 13.0, 14.0, 15.0

CVEs Like This One

CVE-2026-0122Same product: Google Android
CVE-2025-36897Same product: Google Android
CVE-2024-53842Same product: Google Android
CVE-2026-0010Same product: Google Android
CVE-2026-0113Same product: Google Android
CVE-2024-53838Same product: Google Android
CVE-2024-49748Same product: Google Android
CVE-2025-36937Same product: Google Android
CVE-2026-0111Same product: Google Android
CVE-2026-0123Same product: Google Android

References