Integer overflow in diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service via an application that uses crafted arguments in a local diagchar_ioctl call.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 01:42
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.kb.cert.org/vuls/id/702452 - US Government Resource | |
| References | () https://www.codeaurora.org/projects/security-advisories/multiple-issues-diagkgsl-system-call-handling-cve-2012-4220-cve-2012 - | 
Information
                Published : 2012-11-30 12:54
Updated : 2025-04-11 00:51
NVD link : CVE-2012-4221
Mitre link : CVE-2012-4221
CVE.ORG link : CVE-2012-4221
JSON object : View
Products Affected
                - android
 
CWE
                
                    
                        
                        CWE-189
                        
            Numeric Errors
