var-201402-0146
Vulnerability from variot

Multiple stack-based buffer overflows in the MSM camera driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to gain privileges via (1) a crafted VIDIOC_MSM_VPE_DEQUEUE_STREAM_BUFF_INFO ioctl call, related to drivers/media/platform/msm/camera_v2/pproc/vpe/msm_vpe.c, or (2) a crafted VIDIOC_MSM_CPP_DEQUEUE_STREAM_BUFF_INFO ioctl call, related to drivers/media/platform/msm/camera_v2/pproc/cpp/msm_cpp.c. (1) drivers/media/platform/msm/camera_v2/pproc/vpe/msm_vpe.c (2) drivers/media/platform/msm/camera_v2/pproc/cpp/msm_cpp.cAn attacker could gain privileges through the following items: (1) Cleverly crafted VIDIOC_MSM_VPE_DEQUEUE_STREAM_BUFF_INFO ioctl call (2) Cleverly crafted VIDIOC_MSM_CPP_DEQUEUE_STREAM_BUFF_INFO ioctl call. Android for MSM project is prone to multiple stack-based buffer-overflow vulnerabilities because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Local attackers can exploit these issues to run arbitrary code with elevated privileges. Failed exploit attempts will likely result in denial-of-service conditions. MSM camera driver for the Linux kernel is a Qualcomm platform camera driver project based on the Linux kernel. Description

A stack-based buffer overflow and a kernel memory disclosure vulnerability have been discovered in the system call handlers of the camera driver.

CVE-2013-4738

The camera post processing engine (CPP) and video processing engine (VPE) provide an ioctl system call interface to user space clients for communication. When processing arguments passed to the VIDIOC_MSM_CPP_DEQUEUE_STREAM_BUFF_INFO or VIDIOC_MSM_VPE_DEQUEUE_STREAM_BUFF_INFO ioctl subdev handlers, a user space supplied length value is used to copy memory to a local stack buffer without proper bounds checking. An application with access to the respective device nodes can use this flaw to, e.g., elevate privileges.

Access Vector: local Security Risk: high Vulnerability: CWE-121 (stack-based buffer overflow)

CVE-2013-4739

The Gemini JPEG encoder and the Jpeg1.0 common encoder/decoder engines of the camera driver are not properly initializing all members of a structure before copying it to user space. This allows a local attacker to obtain potentially sensitive information from kernel stack memory via ioctl system calls.

Access Vector: local Security Risk: low Vulnerability: CWE-200 (information exposure)

Affected versions

All Android releases from CAF using a Linux kernel from the following heads:

  • msm-3.4
  • jb_3*

Patch

We advise customers to apply the following patches:

CVE-2013-4738:

https://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/?id=c9c81836ee44db9974007d34cf2aaeb1a51a8d45

https://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/?id=28385b9c3054c91dca1aa194ffa750550c50f3ce

CVE-2013-4739:

https://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/?id=8604847927f952cc8e773b97eca24e1060a570f2

Credits

Reported by the researcher Jonathan Salwan and patched by Qualcomm Innovation Center

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201402-0146",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "android-msm",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "codeaurora",
        "version": "2.6.29"
      },
      {
        "model": "quic mobile station modem kernel",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qualcomm",
        "version": "3.4"
      },
      {
        "model": "android for msm",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "android for msm",
        "version": "2.6.29"
      },
      {
        "model": "quic mobile station modem",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "qualcomm",
        "version": "3.4"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4738"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:codeaurora:android-msm",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:qualcomm:quic_mobile_station_modem_kernel",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Jonathan Salwan of the Sysdream Security Lab",
    "sources": [
      {
        "db": "BID",
        "id": "63263"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2013-4738",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2013-4738",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-64740",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-4738",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-4738",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201310-658",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-64740",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2013-4738",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64740"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4738"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4738"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple stack-based buffer overflows in the MSM camera driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to gain privileges via (1) a crafted VIDIOC_MSM_VPE_DEQUEUE_STREAM_BUFF_INFO ioctl call, related to drivers/media/platform/msm/camera_v2/pproc/vpe/msm_vpe.c, or (2) a crafted VIDIOC_MSM_CPP_DEQUEUE_STREAM_BUFF_INFO ioctl call, related to drivers/media/platform/msm/camera_v2/pproc/cpp/msm_cpp.c. (1) drivers/media/platform/msm/camera_v2/pproc/vpe/msm_vpe.c (2) drivers/media/platform/msm/camera_v2/pproc/cpp/msm_cpp.cAn attacker could gain privileges through the following items: (1) Cleverly crafted VIDIOC_MSM_VPE_DEQUEUE_STREAM_BUFF_INFO ioctl call (2) Cleverly crafted VIDIOC_MSM_CPP_DEQUEUE_STREAM_BUFF_INFO ioctl call. Android for MSM project is prone to multiple stack-based buffer-overflow  vulnerabilities because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. \nLocal attackers can exploit these issues to run arbitrary code with elevated  privileges. Failed exploit attempts will   likely result in denial-of-service conditions. MSM camera driver for the Linux kernel is a Qualcomm platform camera driver project based on the Linux kernel. *Description*\n\nA stack-based buffer overflow and a kernel memory disclosure vulnerability\nhave been discovered in the system call handlers of the camera driver. \n\n*CVE-2013-4738*\n\nThe camera post processing engine (CPP) and video processing engine (VPE)\nprovide an ioctl system call interface to user space clients for\ncommunication. When processing arguments passed to the\nVIDIOC_MSM_CPP_DEQUEUE_STREAM_BUFF_INFO or\nVIDIOC_MSM_VPE_DEQUEUE_STREAM_BUFF_INFO ioctl subdev handlers, a user space\nsupplied length value is used to copy memory to a local stack buffer\nwithout proper bounds checking. An application with access to the\nrespective device nodes can use this flaw to, e.g., elevate privileges. \n\nAccess Vector: local\nSecurity Risk: high\nVulnerability: CWE-121 (stack-based buffer overflow)\n\n*CVE-2013-4739*\n\nThe Gemini JPEG encoder and the Jpeg1.0 common encoder/decoder engines of\nthe camera driver are not properly initializing all members of a structure\nbefore copying it to user space. This allows a local attacker to obtain\npotentially sensitive information from kernel stack memory via ioctl system\ncalls. \n\nAccess Vector: local\nSecurity Risk: low\nVulnerability: CWE-200 (information exposure)\n\n*Affected versions*\n\nAll Android releases from CAF using a Linux kernel from the following heads:\n\n- msm-3.4\n- jb_3*\n\n*Patch*\n\nWe advise customers to apply the following patches:\n\nCVE-2013-4738:\n-\nhttps://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/?id=c9c81836ee44db9974007d34cf2aaeb1a51a8d45\n-\nhttps://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/?id=28385b9c3054c91dca1aa194ffa750550c50f3ce\n\nCVE-2013-4739:\n-\nhttps://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/?id=8604847927f952cc8e773b97eca24e1060a570f2\n\n*Credits*\n\nReported by the researcher Jonathan Salwan and patched by Qualcomm\nInnovation Center",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4738"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      },
      {
        "db": "BID",
        "id": "63263"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64740"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4738"
      },
      {
        "db": "PACKETSTORM",
        "id": "123704"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-4738",
        "trust": 3.0
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2013/10/15/4",
        "trust": 1.8
      },
      {
        "db": "BID",
        "id": "63263",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-658",
        "trust": 0.7
      },
      {
        "db": "MLIST",
        "id": "[OSS-SECURITY] 20131015 REPORT - STACK-BASED BUFFER OVERFLOW AND MEMORY DISCLOSURE IN CAMERA DRIVER (CVE-2013-4748 CVE-2013-4739)",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "123704",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-64740",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4738",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64740"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4738"
      },
      {
        "db": "BID",
        "id": "63263"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      },
      {
        "db": "PACKETSTORM",
        "id": "123704"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4738"
      }
    ]
  },
  "id": "VAR-201402-0146",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64740"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T22:31:20.802000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "QCIR-2013-00008-1",
        "trust": 0.8,
        "url": "https://www.codeaurora.org/projects/security-advisories/stack-based-buffer-overflow-and-memory-disclosure-camera-driver-cve-2013-4738-cve-2013-4739"
      },
      {
        "title": "c9c81836ee44db9974007d34cf2aaeb1a51a8d45",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47783"
      },
      {
        "title": "28385b9c3054c91dca1aa194ffa750550c50f3ce",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47782"
      },
      {
        "title": "8604847927f952cc8e773b97eca24e1060a570f2",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47781"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64740"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4738"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.8,
        "url": "https://www.codeaurora.org/projects/security-advisories/stack-based-buffer-overflow-and-memory-disclosure-camera-driver-cve-2013-4748-cve-2013-4739"
      },
      {
        "trust": 1.8,
        "url": "http://www.openwall.com/lists/oss-security/2013/10/15/4"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4738"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4738"
      },
      {
        "trust": 0.7,
        "url": "http://www.securityfocus.com/bid/63263"
      },
      {
        "trust": 0.4,
        "url": "https://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/?id=28385b9c3054c91dca1aa194ffa750550c50f3ce"
      },
      {
        "trust": 0.4,
        "url": "https://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/?id=c9c81836ee44db9974007d34cf2aaeb1a51a8d45"
      },
      {
        "trust": 0.3,
        "url": "https://www.codeaurora.org/xwiki/bin/qaep/"
      },
      {
        "trust": 0.3,
        "url": "https://www.codeaurora.org/projects/security-advisories/stack-based-buffer-overflow-and-memory-disclosure-camera-driver-cve-2013-4738-cve-2013-4739"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/119.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.codeaurora.org/cgit/quic/la/kernel/msm/commit/?id=8604847927f952cc8e773b97eca24e1060a570f2"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4739"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-4738"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64740"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4738"
      },
      {
        "db": "BID",
        "id": "63263"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      },
      {
        "db": "PACKETSTORM",
        "id": "123704"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4738"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-64740"
      },
      {
        "db": "VULMON",
        "id": "CVE-2013-4738"
      },
      {
        "db": "BID",
        "id": "63263"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      },
      {
        "db": "PACKETSTORM",
        "id": "123704"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4738"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64740"
      },
      {
        "date": "2014-02-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2013-4738"
      },
      {
        "date": "2013-10-15T00:00:00",
        "db": "BID",
        "id": "63263"
      },
      {
        "date": "2014-02-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      },
      {
        "date": "2013-10-21T22:22:22",
        "db": "PACKETSTORM",
        "id": "123704"
      },
      {
        "date": "2013-10-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      },
      {
        "date": "2014-02-03T03:55:03.690000",
        "db": "NVD",
        "id": "CVE-2013-4738"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64740"
      },
      {
        "date": "2014-02-21T00:00:00",
        "db": "VULMON",
        "id": "CVE-2013-4738"
      },
      {
        "date": "2013-10-15T00:00:00",
        "db": "BID",
        "id": "63263"
      },
      {
        "date": "2014-02-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      },
      {
        "date": "2014-02-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      },
      {
        "date": "2024-11-21T01:56:15.457000",
        "db": "NVD",
        "id": "CVE-2013-4738"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "63263"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MSM For devices  Qualcomm Innovation Center Android Used for contributions etc.  Linux Kernel for  MSM Buffer overflow vulnerability in camera driver",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-005979"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201310-658"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.