CVE-2013-4736 (GCVE-0-2013-4736)

Vulnerability from cvelistv5 – Published: 2014-02-10 17:00 – Updated: 2024-08-06 16:52
VLAI?
Summary
Multiple integer overflows in the JPEG engine drivers in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (system crash) via a large number of commands in an ioctl call, related to (1) camera_v1/gemini/msm_gemini_sync.c, (2) camera_v2/gemini/msm_gemini_sync.c, (3) camera_v2/jpeg_10/msm_jpeg_sync.c, (4) gemini/msm_gemini_sync.c, (5) jpeg_10/msm_jpeg_sync.c, and (6) mercury/msm_mercury_sync.c.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:26.997Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.codeaurora.org/projects/security-advisories/integer-overflow-and-signedness-issue-camera-jpeg-engines-cve-2013-4736"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-08-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple integer overflows in the JPEG engine drivers in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (system crash) via a large number of commands in an ioctl call, related to (1) camera_v1/gemini/msm_gemini_sync.c, (2) camera_v2/gemini/msm_gemini_sync.c, (3) camera_v2/jpeg_10/msm_jpeg_sync.c, (4) gemini/msm_gemini_sync.c, (5) jpeg_10/msm_jpeg_sync.c, and (6) mercury/msm_mercury_sync.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-08-31T06:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.codeaurora.org/projects/security-advisories/integer-overflow-and-signedness-issue-camera-jpeg-engines-cve-2013-4736"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-4736",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple integer overflows in the JPEG engine drivers in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (system crash) via a large number of commands in an ioctl call, related to (1) camera_v1/gemini/msm_gemini_sync.c, (2) camera_v2/gemini/msm_gemini_sync.c, (3) camera_v2/jpeg_10/msm_jpeg_sync.c, (4) gemini/msm_gemini_sync.c, (5) jpeg_10/msm_jpeg_sync.c, and (6) mercury/msm_mercury_sync.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.codeaurora.org/projects/security-advisories/integer-overflow-and-signedness-issue-camera-jpeg-engines-cve-2013-4736",
              "refsource": "CONFIRM",
              "url": "https://www.codeaurora.org/projects/security-advisories/integer-overflow-and-signedness-issue-camera-jpeg-engines-cve-2013-4736"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-4736",
    "datePublished": "2014-02-10T17:00:00",
    "dateReserved": "2013-07-01T00:00:00",
    "dateUpdated": "2024-08-06T16:52:26.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.2.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82BFCD06-425A-469F-BD52-56C78AB11D54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2E29DBF-4869-41F8-85F6-091F1B34D8F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.73:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D3B42C6-F8F7-493C-81AD-A112A207FC58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.74:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F7F6E06-C45C-47E5-B745-33B1A5083F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.75:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C8DB4C3-3A34-496E-9422-3D7E1425B7D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.76:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B167417-35A9-42BA-874E-0B32EE44AFE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.77:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F93FA4BD-DD95-4402-AC27-C1FB86469A52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.78:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF6C0F8A-CD4A-4B7C-84D2-79150FBAAFF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.4.79:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E392CFA9-C390-4F31-A826-5D2BE237FFD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD74D1CD-DBA8-487D-AE08-F3565B12B5D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A00D89D-63B9-425D-AF50-B274491FA470\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F18C21F4-F5AB-49D0-8B77-6768337B391A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16CCD06D-0248-4802-8FAB-A8411F102078\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08315601-ECBF-489B-8482-4D075ABB8B94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93FEF076-6924-4671-A7B4-619582B1F491\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E89A6BA-599E-4C5F-B60F-FF8175A1EE57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.10.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D0D9E5A-3D4D-41F3-85DE-AA029C0ED86F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC580424-3A41-4110-9CDD-C72B52FD360A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A88D6F21-5D58-4BF2-A3DD-6E1C21A464E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D16E881-C08D-4C23-BA7F-C2811EA65E6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"677023A0-0628-41D0-99B7-CEF547DA7249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD77E075-1B20-4EE2-A14F-49772963E589\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E85620CE-8085-4FE9-B8FE-11585FB2C4AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24FC9829-EF73-4FF6-B752-8EFB4223703A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.12.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F416D6E-9CF0-47E3-BEF9-97571888FB47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5B7FC7D-3287-4B15-879E-321F663EB508\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1A9A837-2771-4443-A18A-1CE2386FBBF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6016DD8-1AB1-43F9-9652-A47FD48861E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"23289CA4-3FE3-43E7-9793-3120928DD43D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"631355B2-8B51-4F16-8733-9C54539E77C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BCE7F05-607F-48E2-B371-FBDCA585561A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"177D555B-CD3B-4E3E-97BD-103AB2A6051A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"45A19E0E-D07B-43E6-B334-A7A3FE4367C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13:rc8:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8C0E4F9-F1B8-459B-9A4F-42164EBCFD61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D220E16-C172-4A6A-971B-6B1B6CA6AA8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D45AF000-98BE-4C23-8E40-A8E202800DC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.14:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E922227-ADB4-41CC-AC2E-10D0F9FD165E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:codeaurora:android-msm:3.14:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0BED70D-0E2E-433A-A8B1-3418793969CD\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple integer overflows in the JPEG engine drivers in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (system crash) via a large number of commands in an ioctl call, related to (1) camera_v1/gemini/msm_gemini_sync.c, (2) camera_v2/gemini/msm_gemini_sync.c, (3) camera_v2/jpeg_10/msm_jpeg_sync.c, (4) gemini/msm_gemini_sync.c, (5) jpeg_10/msm_jpeg_sync.c, and (6) mercury/msm_mercury_sync.c.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples desbordamientos de enteros en los controladores de motor JPEG en el controlador de c\\u00e1mara MSM para el kernel de Linux versiones 2.6.x y 3.x, como es usado en las contribuciones de Android Qualcomm Innovation Center (QuIC) para dispositivos MSM y otros productos, permiten a los atacantes causar una denegaci\\u00f3n de servicio (bloqueo del sistema) por medio de un gran n\\u00famero de comandos en una llamada ioctl, relacionados con los archivos (1) camera_v1/gemini/msm_gemini_sync.c, (2) camera_v2/gemini/msm__gemini.c, (3) camera_v2/jpeg_10/msm_ jpeg_sync.c, (4) gemini/msm_gemini_sync.c, (5) jpeg_10/msm_jpeg_sync.c y (6) mercury/msm_mercury_sync.c.\"}]",
      "id": "CVE-2013-4736",
      "lastModified": "2024-11-21T01:56:15.017",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2014-02-10T18:15:10.543",
      "references": "[{\"url\": \"https://www.codeaurora.org/projects/security-advisories/integer-overflow-and-signedness-issue-camera-jpeg-engines-cve-2013-4736\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://www.codeaurora.org/projects/security-advisories/integer-overflow-and-signedness-issue-camera-jpeg-engines-cve-2013-4736\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2013-4736\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2014-02-10T18:15:10.543\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple integer overflows in the JPEG engine drivers in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allow attackers to cause a denial of service (system crash) via a large number of commands in an ioctl call, related to (1) camera_v1/gemini/msm_gemini_sync.c, (2) camera_v2/gemini/msm_gemini_sync.c, (3) camera_v2/jpeg_10/msm_jpeg_sync.c, (4) gemini/msm_gemini_sync.c, (5) jpeg_10/msm_jpeg_sync.c, and (6) mercury/msm_mercury_sync.c.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de enteros en los controladores de motor JPEG en el controlador de c\u00e1mara MSM para el kernel de Linux versiones 2.6.x y 3.x, como es usado en las contribuciones de Android Qualcomm Innovation Center (QuIC) para dispositivos MSM y otros productos, permiten a los atacantes causar una denegaci\u00f3n de servicio (bloqueo del sistema) por medio de un gran n\u00famero de comandos en una llamada ioctl, relacionados con los archivos (1) camera_v1/gemini/msm_gemini_sync.c, (2) camera_v2/gemini/msm__gemini.c, (3) camera_v2/jpeg_10/msm_ jpeg_sync.c, (4) gemini/msm_gemini_sync.c, (5) jpeg_10/msm_jpeg_sync.c y (6) mercury/msm_mercury_sync.c.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.2.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82BFCD06-425A-469F-BD52-56C78AB11D54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E29DBF-4869-41F8-85F6-091F1B34D8F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D3B42C6-F8F7-493C-81AD-A112A207FC58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F7F6E06-C45C-47E5-B745-33B1A5083F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C8DB4C3-3A34-496E-9422-3D7E1425B7D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B167417-35A9-42BA-874E-0B32EE44AFE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F93FA4BD-DD95-4402-AC27-C1FB86469A52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.78:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF6C0F8A-CD4A-4B7C-84D2-79150FBAAFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.4.79:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E392CFA9-C390-4F31-A826-5D2BE237FFD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD74D1CD-DBA8-487D-AE08-F3565B12B5D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A00D89D-63B9-425D-AF50-B274491FA470\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F18C21F4-F5AB-49D0-8B77-6768337B391A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16CCD06D-0248-4802-8FAB-A8411F102078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08315601-ECBF-489B-8482-4D075ABB8B94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93FEF076-6924-4671-A7B4-619582B1F491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E89A6BA-599E-4C5F-B60F-FF8175A1EE57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.10.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D0D9E5A-3D4D-41F3-85DE-AA029C0ED86F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC580424-3A41-4110-9CDD-C72B52FD360A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A88D6F21-5D58-4BF2-A3DD-6E1C21A464E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D16E881-C08D-4C23-BA7F-C2811EA65E6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"677023A0-0628-41D0-99B7-CEF547DA7249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD77E075-1B20-4EE2-A14F-49772963E589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E85620CE-8085-4FE9-B8FE-11585FB2C4AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24FC9829-EF73-4FF6-B752-8EFB4223703A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F416D6E-9CF0-47E3-BEF9-97571888FB47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B7FC7D-3287-4B15-879E-321F663EB508\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A9A837-2771-4443-A18A-1CE2386FBBF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6016DD8-1AB1-43F9-9652-A47FD48861E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"23289CA4-3FE3-43E7-9793-3120928DD43D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"631355B2-8B51-4F16-8733-9C54539E77C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BCE7F05-607F-48E2-B371-FBDCA585561A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"177D555B-CD3B-4E3E-97BD-103AB2A6051A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"45A19E0E-D07B-43E6-B334-A7A3FE4367C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C0E4F9-F1B8-459B-9A4F-42164EBCFD61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D220E16-C172-4A6A-971B-6B1B6CA6AA8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45AF000-98BE-4C23-8E40-A8E202800DC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E922227-ADB4-41CC-AC2E-10D0F9FD165E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:codeaurora:android-msm:3.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BED70D-0E2E-433A-A8B1-3418793969CD\"}]}]}],\"references\":[{\"url\":\"https://www.codeaurora.org/projects/security-advisories/integer-overflow-and-signedness-issue-camera-jpeg-engines-cve-2013-4736\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.codeaurora.org/projects/security-advisories/integer-overflow-and-signedness-issue-camera-jpeg-engines-cve-2013-4736\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…