CVE-2014-0973
https://notcve.org/view.php?id=CVE-2014-0973
The image_verify function in platform/msm_shared/image_verify.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not check whether a certain digest size is consistent with the RSA_public_decrypt API specification, which makes it easier for attackers to bypass boot-image authentication requirements via trailing data. La función image_verify en platform/msm_shared/image_verify.c en el bootloader Little Kernel (LK), distribuido con las contribuciones Android Qualcomm Innovation Center (QuIC) para dispositivos MSM y otros productoss, no comprueba si cierto tamaño digest es consistente con la especificación RSA_public_decrypt API, lo que facilita a atacantes evadir los requisitos de la autenticación para arranque de imágenes a través de datos finales. • http://source.android.com/security/bulletin/2016-07-01.html https://www.codeaurora.org/projects/security-advisories/incomplete-signature-parsing-during-boot-image-authentication-leads-to-signature-forgery-cve-2014-0973 • CWE-287: Improper Authentication •
CVE-2014-4325
https://notcve.org/view.php?id=CVE-2014-4325
The cmd_boot function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to bypass intended device-lock and kernel-signature restrictions by using fastboot mode in a boot command for an arbitrary kernel image. La función cmd_boot en app/aboot/aboot.c en el bootloader Little Kernel (LK), distribuido con las contribuciones Android Qualcomm Innovation Center (QuIC) para los dispositivos MSM y otros productos, permite a atacantes evadir las restricciones de bloqueo del dispositivo y firma del kernel mediante el uso del modo de arranque rápido en un comando de arranque para un imagen del kernel arbitrario. • https://www.codeaurora.org/projects/security-advisories/fastboot-boot-command-bypasses-signature-verification-cve-2014-4325 • CWE-287: Improper Authentication •
CVE-2014-0974
https://notcve.org/view.php?id=CVE-2014-0974
The boot_linux_from_mmc function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly validate a certain address value, which allows attackers to write data to a controllable memory location by leveraging the ability to initiate an attempted boot of an arbitrary image. La función boot_linux_from_mmc en app/aboot/aboot.c en el bootloader Little Kernel (LK), distribuido con las contribuciones de Android Qualcomm Innovation Center (QuIC) para los dispositivos MSM y otros productos, no valida debidamente cierto valor de direcciones, lo que permite a atacantes escribir datos en una localización de memoria controlable mediante el aprovechamiento de la habilidad de iniciar un intento de arranque de un imagen arbitrario. • http://source.android.com/security/bulletin/2016-07-01.html https://www.codeaurora.org/projects/security-advisories/lk-insufficient-verification-tagaddr-when-loading-device-tree-cve-2014-0974 • CWE-264: Permissions, Privileges, and Access Controls •