3 results (0.003 seconds)

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

25 Aug 2014 — The cmd_boot function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to bypass intended device-lock and kernel-signature restrictions by using fastboot mode in a boot command for an arbitrary kernel image. La función cmd_boot en app/aboot/aboot.c en el bootloader Little Kernel (LK), distribuido con las contribuciones Android Qualcomm Innovation Center (QuIC) para los d... • https://www.codeaurora.org/projects/security-advisories/fastboot-boot-command-bypasses-signature-verification-cve-2014-4325 • CWE-287: Improper Authentication •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

25 Aug 2014 — The image_verify function in platform/msm_shared/image_verify.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not check whether a certain digest size is consistent with the RSA_public_decrypt API specification, which makes it easier for attackers to bypass boot-image authentication requirements via trailing data. La función image_verify en platform/msm_shared/image_verify.c en el bootloader Little Ke... • http://source.android.com/security/bulletin/2016-07-01.html • CWE-287: Improper Authentication •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

25 Aug 2014 — The boot_linux_from_mmc function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly validate a certain address value, which allows attackers to write data to a controllable memory location by leveraging the ability to initiate an attempted boot of an arbitrary image. La función boot_linux_from_mmc en app/aboot/aboot.c en el bootloader Little Kernel (LK), distribuido con l... • http://source.android.com/security/bulletin/2016-07-01.html • CWE-264: Permissions, Privileges, and Access Controls •