본문 바로가기

Smart Platform/Android

[CVE-2012-2674] Multiple integer overflows for Android

Original release date:07/25/2012

Last revised:07/26/2012

Source: US-CERT/NIST


Overview

Multiple integer overflows in the (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign functions in libc/bionic/malloc_debug_leak.c in Bionic (libc) for Android, when libc.debug.malloc is set, make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.


Android 환경에서 Bionic (libc) 내에 있는 libc/bionic/malloc_debug_leak.c 의 (1) chk_malloc, (2) leak_malloc, and (3) leak_memalign 함수의 Integer overflows


Impact

CVSS Severity (version 2.0):

CVSS v2 Base Score:4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)

Impact Subscore: 2.9

Exploitability Subscore: 8.6


CVSS Version 2 Metrics:

Access Vector: Network exploitable

Access Complexity: Medium

Authentication: Not required to exploit

Impact Type:Allows unauthorized modification


References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.


External Source: CONFIRM

Name: https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385

Type: Patch Information; Exploit

Hyperlink: https://github.com/android/platform_bionic/commit/7f5aa4f35e23fd37425b3a5041737cdf58f87385


External Source: MLIST

Name: [oss-security] 20120607 Re: memory allocator upstream patches

Hyperlink:http://www.openwall.com/lists/oss-security/2012/06/07/13


External Source: MLIST

Name: [oss-security] 20120605 memory allocator upstream patches

Hyperlink: http://www.openwall.com/lists/oss-security/2012/06/05/1


External Source: MISC

Name: http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/

Hyperlink: http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/


Vulnerable software and versions

  Configuration 1

OR

* cpe:/a:google:bionic:::%7E%7E%7Eandroid%7E%7E

* Denotes Vulnerable Software

* Changes related to vulnerability configurations


Technical Details

Vulnerability Type (View All)

Numeric Errors (CWE-189)


CVE Standard Vulnerability Entry: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2674


[출처] : NIST(National Institute of Standards and Technology)