diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.kb.cert.org/vuls/id/702452 - US Government Resource | |
References | () https://www.codeaurora.org/projects/security-advisories/multiple-issues-diagkgsl-system-call-handling-cve-2012-4220-cve-2012 - |
Information
Published : 2012-11-30 12:54
Updated : 2024-11-21 01:42
NVD link : CVE-2012-4220
Mitre link : CVE-2012-4220
CVE.ORG link : CVE-2012-4220
JSON object : View
Products Affected
- android
CWE