First published: Fri Nov 30 2012(Updated: )
Integer overflow in diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service via an application that uses crafted arguments in a local diagchar_ioctl call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =2.3 | |
Android | =2.3-rev1 | |
Android | =2.3.1 | |
Android | =2.3.2 | |
Android | =2.3.3 | |
Android | =2.3.4 | |
Android | =2.3.5 | |
Android | =2.3.6 | |
Android | =2.3.7 | |
Android | =3.0 | |
Android | =3.1 | |
Android | =3.2 | |
Android | =3.2.1 | |
Android | =3.2.2 | |
Android | =3.2.4 | |
Android | =3.2.6 | |
Android | =4.0 | |
Android | =4.0.1 | |
Android | =4.0.2 | |
Android | =4.0.3 | |
Android | =4.0.4 | |
Android | =4.1 | |
Android | =4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4221 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2012-4221, update the Android operating system to a version that addresses this vulnerability.
CVE-2012-4221 affects Android versions 2.3 through 4.2, including several specific releases.
CVE-2012-4221 can be exploited to execute arbitrary code or cause a denial of service through crafted arguments in a local diagchar_ioctl call.
There are no known effective workarounds for CVE-2012-4221; the best mitigation is to update to an unaffected version.