First published: Tue Aug 21 2012(Updated: )
The Samsung and HTC onTouchEvent method implementation for Android on the T-Mobile myTouch 3G Slide, HTC Merge, Sprint EVO Shift 4G, HTC ChaCha, AT&T Status, HTC Desire Z, T-Mobile G2, T-Mobile myTouch 4G Slide, and Samsung Galaxy S stores touch coordinates in the dmesg buffer, which allows remote attackers to obtain sensitive information via a crafted application, as demonstrated by PIN numbers, telephone numbers, and text messages.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
AT&T Status | ||
HTC ChaCha | ||
HTC Desire | ||
HTC Merge | ||
Samsung Galaxy S | ||
HTC Shift 4G | ||
T-Mobile G2 | ||
T-Mobile myTouch 3G Slide | ||
T-Mobile myTouch 4G Slide |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2980 is considered a medium severity vulnerability due to the potential for remote code execution.
To fix CVE-2012-2980, ensure that your device firmware is updated to the latest version provided by the manufacturer.
CVE-2012-2980 affects several devices including the Samsung Galaxy S, HTC ChaCha, and T-Mobile G2.
CVE-2012-2980 is a vulnerability in the touch event handling method that allows for potential information leakage.
Yes, CVE-2012-2980 can potentially be exploited remotely due to the way touch coordinates are stored.