app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory locations within bootloader memory.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.codeaurora.org/projects/security-advisories/loading-image-data-memory-locations-based-untrusted-header-data-lk-bootloader-cve-2013-2598 - Vendor Advisory |
Information
Published : 2014-08-31 10:55
Updated : 2024-11-21 01:52
NVD link : CVE-2013-2598
Mitre link : CVE-2013-2598
CVE.ORG link : CVE-2013-2598
JSON object : View
Products Affected
codeaurora
- android-msm
CWE
CWE-20
Improper Input Validation