Original release date:07/25/2012
Last revised:07/26/2012
Source: US-CERT/NIST
Overview
Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
Android 환경에서 Bionic (libc) 내에 있는 libc/bionic/malloc_debug_leak.c 의 (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign 함수의 Integer overflows
Impact
CVSS Severity (version 2.0):
CVSS v2 Base Score:4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore: 2.9
Exploitability Subscore: 8.6
CVSS Version 2 Metrics:
Access Vector: Network exploitable
Access Complexity: Medium
Authentication: Not required to exploit
Impact Type:Allows unauthorized modification
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.
External Source: CONFIRM
Name: https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385
Type: Patch Information; Exploit
Hyperlink: https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385
External Source: MLIST
Name: [oss-security] 20120607 Re: memory allocator upstream patches
Hyperlink:http://www.openwall.com/lists/oss-security/2012/06/07/13
External Source: MLIST
Name: [oss-security] 20120605 memory allocator upstream patches
Hyperlink: http://www.openwall.com/lists/oss-security/2012/06/05/1
External Source: MISC
Name: http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/
Hyperlink: http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/
Vulnerable software and versions
Configuration 1
OR
* cpe:/a:google:bionic:::%7E%7E%7Eandroid%7E%7E
* Denotes Vulnerable Software
* Changes related to vulnerability configurations
Technical Details
Vulnerability Type (View All)
Numeric Errors (CWE-189)
CVE Standard Vulnerability Entry: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2674
'Smart Platform > Android' 카테고리의 다른 글
[Android Debugging]gdb & gdbserver setting process (1) | 2013.02.25 |
---|---|
스마트폰 침해사고 사례 조사 (Android) (0) | 2012.08.23 |
[CVE-2012-2646] The Sleipnir Mobile application before 2.1.0 and Sleipnir Mobile Black Edition application before 2.1.0 for Android (0) | 2012.07.26 |
[CVE-2012-2808] Weak randomness Android DNS resolver (0) | 2012.07.25 |
Android(구글 안드로이드)에 대한 간략한 특징 및 보안(Security) 이슈 (0) | 2012.06.25 |