First published: Mon Aug 25 2014(Updated: )
The image_verify function in platform/msm_shared/image_verify.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not check whether a certain digest size is consistent with the RSA_public_decrypt API specification, which makes it easier for attackers to bypass boot-image authentication requirements via trailing data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Little Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0973 is rated as a high severity vulnerability due to potential exploitation that could allow attackers to bypass signature verification.
To fix CVE-2014-0973, update to a patched version of the Little Kernel bootloader that addresses the digest size checking issue.
CVE-2014-0973 affects devices utilizing the Little Kernel bootloader distributed with Qualcomm Innovation Center Android contributions for MSM devices.
The potential impacts of CVE-2014-0973 include unauthorized access and execution of malicious code due to inadequate signature verification.
Users of devices running vulnerable versions of the Little Kernel bootloader are impacted by CVE-2014-0973.