First published: Fri Nov 30 2012(Updated: )
diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =2.3 | |
Android | =2.3-rev1 | |
Android | =2.3.1 | |
Android | =2.3.2 | |
Android | =2.3.3 | |
Android | =2.3.4 | |
Android | =2.3.5 | |
Android | =2.3.6 | |
Android | =2.3.7 | |
Android | =3.0 | |
Android | =3.1 | |
Android | =3.2 | |
Android | =3.2.1 | |
Android | =3.2.2 | |
Android | =3.2.4 | |
Android | =3.2.6 | |
Android | =4.0 | |
Android | =4.0.1 | |
Android | =4.0.2 | |
Android | =4.0.3 | |
Android | =4.0.4 | |
Android | =4.1 | |
Android | =4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4220 is classified as a critical vulnerability due to its potential for arbitrary code execution and denial of service.
To fix CVE-2012-4220, upgrade your Android operating system to a version higher than 4.2 that contains the patched DIAG kernel-mode driver.
CVE-2012-4220 affects Android versions from 2.3 up to 4.2.
CVE-2012-4220 requires local access to the device, making remote exploitation unlikely.
CVE-2012-4220 addresses issues in the Qualcomm DIAG kernel-mode driver that allow for incorrect pointer dereferencing.