2 results (0.005 seconds)

CVSS: 6.2EPSS: 0%CPEs: 5EXPL: 1

The TrustZone kernel, when used in conjunction with a certain Motorola build of Android 4.1.2, on Motorola Razr HD, Razr M, and Atrix HD devices with the Qualcomm MSM8960 chipset does not verify the association between a certain physical-address argument and a memory region, which allows local users to unlock the bootloader by using kernel mode to perform crafted 0x9 and 0x2 SMC operations, a different vulnerability than CVE-2013-2596. El núcleo TrustZone, cuando se utiliza con determinada versión de Motorola Android 4.1.2, el Motorola Razr HD, M Razr, Atrix HD con el chipset Qualcomm MSM8960 no verifica la asociación entre determinada argumento dirección-física y un región de memoria, lo que permite desbloquear a usuarios locales el bootloader usando el modo kernel para realizar operaciones SMC 0x9 y 0x2. Se trata de una vulnerabilidad diferente a CVE-2013-2596. • http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html http://www.droid-life.com/2013/04/08/motorola-razr-hd-razr-m-and-atrix-hd-bootloader-unlock-released • CWE-16: Configuration •

CVSS: 7.8EPSS: 0%CPEs: 9EXPL: 4

Integer overflow in the fb_mmap function in drivers/video/fbmem.c in the Linux kernel before 3.8.9, as used in a certain Motorola build of Android 4.1.2 and other products, allows local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system calls, as demonstrated by the Motochopper pwn program. Una determinada version de Android v4.1.2 en dispositivos Motorola Razr HD, Razr M, y Atrix HD con el chipset Qualcomm MSM8960 permite a atacantes físicamente próximos obtener acceso de root entrando en el modo de depuración USB, usando Android Debug Bridge (ADB) para establecer una conexión USB, y cargar y ejecutar el programa pwn Motochopper. An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system. Linux kernel fb_mmap function in drivers/video/fbmem.c contains an integer overflow vulnerability that allows for privilege escalation. • http://forum.xda-developers.com/showthread.php?t=2255491 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4cbb197c7e7a68dbad0d491242e3ca67420c13e http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fc9bbca8f650e5f738af8806317c0a041a48ae4a http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 http://marc.info/? • CWE-190: Integer Overflow or Wraparound •