First published: Fri Nov 30 2012(Updated: )
diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =2.3 | |
Google Android | =2.3-rev1 | |
Google Android | =2.3.1 | |
Google Android | =2.3.2 | |
Google Android | =2.3.3 | |
Google Android | =2.3.4 | |
Google Android | =2.3.5 | |
Google Android | =2.3.6 | |
Google Android | =2.3.7 | |
Google Android | =3.0 | |
Google Android | =3.1 | |
Google Android | =3.2 | |
Google Android | =3.2.1 | |
Google Android | =3.2.2 | |
Google Android | =3.2.4 | |
Google Android | =3.2.6 | |
Google Android | =4.0 | |
Google Android | =4.0.1 | |
Google Android | =4.0.2 | |
Google Android | =4.0.3 | |
Google Android | =4.0.4 | |
Google Android | =4.1 | |
Google Android | =4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.