7.2
CVSSv2

CVE-2014-4322

Published: 24/12/2014 Updated: 14/08/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 726
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows malicious users to gain privileges or cause a denial of service (memory corruption) via a crafted application.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Exploits

/* * CVE-2014-4322 exploit for Nexus Android 50 * * author: retme retme7@gmailcom * website: retmenet * * The exploit must be excuted as system privilege and specific SELinux context * If exploit successed,you will gain root privilege and "kernel" SELinux context * * bu ...

Github Repositories

Local root exploit for Nexus5 Android 4.4.4(KTU84P)

CVE-2014-7911_poc Local root exploit for Nexus5 Android 444(KTU8P) author: retme (retme7@gmailcom) @returnsme on twitter & @retme on weibo website: retmenet how to build Import the project into eclipse,and build /cve20147911/assets/msmattack is the binary file of CVE-2014-4322 exploitYou can find it here: githubcom/retme7/CVE-2014-4322_poc bug info htt

Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc

CVE-2014-4322_poc poc code works on Nexus Android 44/50 Gain privileges:system -> root,as a part of githubcom/retme7/CVE-2014-7911_poc author: retme (retme7@gmailcom) @returnsme on twitter & @retme on weibo website: retmenet The exploit must be excuted as system privilege and several specific SELinux context If exploit successed,you will gain

Awesome-Android-Vulnerability-Research Resources for Android/IOS vulnerability research All resource credits go to the respectful authors Books Android Hacker's Handbook Android Security Internals Android Security Research Playbook Youtube Videos maddiestone channel Billy Ellis Android Kernel Exploitation | Payatu Workshop Android Kernel Exploitation with Binder Use-

CVE-2014-4322 Exploit

cve-2014-4322 CVE-2014-4322 Exploit

Just an attempt to adapt for Note 4, I do not know what I am doing.

CVE-2014-4322_adaptation Just an attempt to adapt for Note 4, I do not know what I am doing There is currently a way to write to system using ADB (CVE-2014-7951 and CVE-2014-7953) zxz0O0 has confirmed writing to system works What we needed was to gain System UID to execute CVE-2014-4322 I am looking at how CVE-2014-4322 works to see if I could wrap it in an APK which may al