Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-4220

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2012-4220
Last Modified 10 Oct 2013 02:28:04
Published 30 Nov 2012 07:54:16
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2012-4220

Summary

diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.

Vulnerable Systems

Operating System

  • Google Android 2.3

  • Google Android 2.3.1

  • Google Android 2.3.2

  • Google Android 2.3.3

  • Google Android 2.3.4

  • Google Android 2.3.5

  • Google Android 2.3.6

  • Google Android 2.3.7

  • Google Android 3.0

  • Google Android 3.1

  • Google Android 3.2

  • Google Android 3.2.1

  • Google Android 3.2.2

  • Google Android 3.2.4

  • Google Android 3.2.6

  • Google Android 4.0

  • Google Android 4.0.1

  • Google Android 4.0.2

  • Google Android 4.0.3

  • Google Android 4.0.4

  • Google Android 4.1

  • Google Android 4.2


References

CONFIRM - https://www.codeaurora.org/participate/security-advisories/cve-2012-4220-cve-2012-4221-cve-2012-4222/

CERT-VN - VU#702452

CONFIRM - https://www.codeaurora.org/projects/security-advisories/multiple-issues-diagkgsl-system-call-handling-cve-2012-4220-cve-2012


Last Updated: 27 May 2016 10:57:37