The MetaIO SDK before 6.0.2.1 for Android might allow attackers to execute arbitrary code by leveraging a finalize method in a Serializable class that improperly passes an attacker-controlled pointer to a native function.Referenceshttps://www.usenix.org/system/files/conference/woot15/woot15-paper-peles.pdfhttps://alephsecurity.com/vulns/aleph-2015002