The image_verify function in platform/msm_shared/image_verify.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not check whether a certain digest size is consistent with the RSA_public_decrypt API specification, which makes it easier for attackers to bypass boot-image authentication requirements via trailing data.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://source.android.com/security/bulletin/2016-07-01.html - | |
References | () https://www.codeaurora.org/projects/security-advisories/incomplete-signature-parsing-during-boot-image-authentication-leads-to-signature-forgery-cve-2014-0973 - Patch |
Information
Published : 2014-08-25 01:55
Updated : 2024-11-21 02:03
NVD link : CVE-2014-0973
Mitre link : CVE-2014-0973
CVE.ORG link : CVE-2014-0973
JSON object : View
Products Affected
little_kernel_project
- little_kernel_bootloader
CWE
CWE-287
Improper Authentication