Vulnerabilities > CVE-2014-1909 - Numeric Errors vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer signedness error in system/core/adb/adb_client.c in Android Debug Bridge (ADB) for Android 4.4 in the Android SDK Platform Tools 18.0.1 allows ADB servers to execute arbitrary code via a negative length value, which bypasses a signed comparison and triggers a stack-based buffer overflow.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 2 | |
Application | 2 |
Common Weakness Enumeration (CWE)
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2015-0938.NASL description Harden android-tools Update to 5.0.2 release Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-05 modified 2015-02-16 plugin id 81348 published 2015-02-16 reporter This script is Copyright (C) 2015-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/81348 title Fedora 21 : android-tools-20141219git8393e50-2.fc21 (2015-0938) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2015-0938. # include("compat.inc"); if (description) { script_id(81348); script_version("1.3"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2014-1909"); script_xref(name:"FEDORA", value:"2015-0938"); script_name(english:"Fedora 21 : android-tools-20141219git8393e50-2.fc21 (2015-0938)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "Harden android-tools Update to 5.0.2 release Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=1062095" ); # https://lists.fedoraproject.org/pipermail/package-announce/2015-February/149890.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?a31b8678" ); script_set_attribute( attribute:"solution", value:"Update the affected android-tools package." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:android-tools"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:21"); script_set_attribute(attribute:"patch_publication_date", value:"2015/01/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2015/02/16"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^21([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 21.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC21", reference:"android-tools-20141219git8393e50-2.fc21")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "android-tools"); }
NASL family SuSE Local Security Checks NASL id OPENSUSE-2014-357.NASL description - Fix overflow in adb CVE-2014-1909 [bnc#863074] - fix-overflow-in-adb_client.patch last seen 2020-06-05 modified 2014-06-13 plugin id 75353 published 2014-06-13 reporter This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/75353 title openSUSE Security Update : android-tools (openSUSE-SU-2014:0636-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2014-357. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(75353); script_version("1.3"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2014-1909"); script_name(english:"openSUSE Security Update : android-tools (openSUSE-SU-2014:0636-1)"); script_summary(english:"Check for the openSUSE-2014-357 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: " - Fix overflow in adb CVE-2014-1909 [bnc#863074] - fix-overflow-in-adb_client.patch" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=863074" ); script_set_attribute( attribute:"see_also", value:"https://lists.opensuse.org/opensuse-updates/2014-05/msg00038.html" ); script_set_attribute( attribute:"solution", value:"Update the affected android-tools packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:android-tools"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:android-tools-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:android-tools-debugsource"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:13.1"); script_set_attribute(attribute:"patch_publication_date", value:"2014/05/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE13\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "13.1", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE13.1", reference:"android-tools-4.2.2_r1-2.4.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"android-tools-debuginfo-4.2.2_r1-2.4.1") ) flag++; if ( rpm_check(release:"SUSE13.1", reference:"android-tools-debugsource-4.2.2_r1-2.4.1") ) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "android-tools / android-tools-debuginfo / android-tools-debugsource"); }
NASL family SuSE Local Security Checks NASL id OPENSUSE-2014-358.NASL description - Fix overflow in adb CVE-2014-1909 [bnc#863074] - fix-overflow-in-adb_client.patch last seen 2020-06-05 modified 2014-06-13 plugin id 75354 published 2014-06-13 reporter This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/75354 title openSUSE Security Update : android-tools (openSUSE-SU-2014:0637-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2014-358. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(75354); script_version("1.3"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2014-1909"); script_name(english:"openSUSE Security Update : android-tools (openSUSE-SU-2014:0637-1)"); script_summary(english:"Check for the openSUSE-2014-358 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: " - Fix overflow in adb CVE-2014-1909 [bnc#863074] - fix-overflow-in-adb_client.patch" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=863074" ); script_set_attribute( attribute:"see_also", value:"https://lists.opensuse.org/opensuse-updates/2014-05/msg00039.html" ); script_set_attribute( attribute:"solution", value:"Update the affected android-tools packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:android-tools"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:android-tools-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:android-tools-debugsource"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:12.3"); script_set_attribute(attribute:"patch_publication_date", value:"2014/05/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/06/13"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE12\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "12.3", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE12.3", reference:"android-tools-4.2.1_r1-2.5.1") ) flag++; if ( rpm_check(release:"SUSE12.3", reference:"android-tools-debuginfo-4.2.1_r1-2.5.1") ) flag++; if ( rpm_check(release:"SUSE12.3", reference:"android-tools-debugsource-4.2.1_r1-2.5.1") ) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "android-tools / android-tools-debuginfo / android-tools-debugsource"); }
Seebug
bulletinFamily | exploit |
description | Bugtraq ID:65403 CVE ID:CVE-2014-1909 Android SDK提供API库和开发工具,建立,测试,调试应用程序和Android。 Android Debug Bridge不正确使用整数值,允许攻击者利用漏洞触发一个基于栈的缓冲区溢出,可使应用程序崩溃或可执行任意代码。 0 Android SDK Tools 目前没有详细解决方案提供: http://developer.android.com/tools/sdk/tools-notes.html? |
id | SSV:61467 |
last seen | 2017-11-19 |
modified | 2014-02-18 |
published | 2014-02-18 |
reporter | Root |
title | Android SDK平台工具符号错误栈缓冲区溢出漏洞 |
References
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00038.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00039.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00039.html
- http://seclists.org/oss-sec/2014/q1/291
- http://seclists.org/oss-sec/2014/q1/291
- http://www.securityfocus.com/bid/65403
- http://www.securityfocus.com/bid/65403
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91291
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91291