Integer overflow in diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 up to and including 4.2 allows malicious users to execute arbitrary code or cause a denial of service via an application that uses crafted arguments in a local diagchar_ioctl call.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
google android 2.3 |
||
google android 2.3.1 |
||
google android 2.3.2 |
||
google android 4.0 |
||
google android 4.1 |
||
google android 4.0.4 |
||
google android 4.0.3 |
||
google android 2.3.4 |
||
google android 2.3.6 |
||
google android 3.2.1 |
||
google android 3.2.4 |
||
google android 4.0.2 |
||
google android 4.2 |
||
google android 2.3.7 |
||
google android 3.1 |
||
google android 3.2 |
||
google android 3.0 |
||
google android 2.3.3 |
||
google android 2.3.5 |
||
google android 3.2.2 |
||
google android 3.2.6 |
||
google android 4.0.1 |