app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory locations within bootloader memory.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 01:52
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.codeaurora.org/projects/security-advisories/loading-image-data-memory-locations-based-untrusted-header-data-lk-bootloader-cve-2013-2598 - Vendor Advisory | 
Information
                Published : 2014-08-31 10:55
Updated : 2025-04-12 10:46
NVD link : CVE-2013-2598
Mitre link : CVE-2013-2598
CVE.ORG link : CVE-2013-2598
JSON object : View
Products Affected
                codeaurora
- android-msm
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
