Vulnerabilities > Google > Android > 4.0.3

DATE CVE VULNERABILITY TITLE RISK
2014-09-04 CVE-2014-6060 Resource Management Errors vulnerability in multiple products
The get_option function in dhcpcd 4.0.0 through 6.x before 6.4.3 allows remote DHCP servers to cause a denial of service by resetting the DHO_OPTIONSOVERLOADED option in the (1) bootfile or (2) servername section, which triggers the option to be processed again.
low complexity
dhcpcd-project google CWE-399
3.3
2014-04-29 CVE-2013-7373 Information Exposure vulnerability in Google Android
Android before 4.4 does not properly arrange for seeding of the OpenSSL PRNG, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging use of the PRNG within multiple applications.
network
low complexity
google CWE-200
7.5
2014-04-29 CVE-2013-7372 Cryptographic Issues vulnerability in multiple products
The engineNextBytes function in classlib/modules/security/src/main/java/common/org/apache/harmony/security/provider/crypto/SHA1PRNG_SecureRandomImpl.java in the SecureRandom implementation in Apache Harmony through 6.0M3, as used in the Java Cryptography Architecture (JCA) in Android before 4.4 and other products, when no seed is provided by the user, uses an incorrect offset value, which makes it easier for attackers to defeat cryptographic protection mechanisms by leveraging the resulting PRNG predictability, as exploited in the wild against Bitcoin wallet applications in August 2013.
network
low complexity
apache google CWE-310
5.0
2014-03-31 CVE-2013-6775 Permissions, Privileges, and Access Controls vulnerability in Chainfire Supersu 1.69
The Chainfire SuperSU package before 1.69 for Android allows attackers to gain privileges via the (1) backtick or (2) $() type of shell metacharacters in the -c option to /system/xbin/su.
network
low complexity
chainfire google CWE-264
critical
10.0
2014-03-31 CVE-2013-6774 Untrusted search path vulnerability in the ChainsDD Superuser package 3.1.3 for Android 4.2.x and earlier, CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and earlier, and Chainfire SuperSU package before 1.69 for Android 4.2.x and earlier allows attackers to load an arbitrary .jar file and gain privileges via a crafted BOOTCLASSPATH environment variable for a /system/xbin/su process.
network
low complexity
chainfire google androidsu koushik-dutta
critical
10.0
2014-03-31 CVE-2013-6768 Path Traversal vulnerability in Koushik Dutta Superuser 1.0.2.1
Untrusted search path vulnerability in the CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and earlier allows attackers to trigger the launch of a Trojan horse app_process program via a crafted PATH environment variable for a /system/xbin/su process.
network
low complexity
koushik-dutta google CWE-22
5.0
2014-03-19 CVE-2014-1979 Code Injection vulnerability in Nttdocomo Spmode Mail Android
The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message.
6.8
2014-03-19 CVE-2014-1978 Permissions, Privileges, and Access Controls vulnerability in Nttdocomo Spmode Mail Android
The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application.
4.3
2014-03-19 CVE-2014-1977 Permissions, Privileges, and Access Controls vulnerability in Nttdocomo Spmode Mail Android
The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application.
4.3
2014-03-03 CVE-2014-1939 Code Injection vulnerability in multiple products
java/android/webkit/BrowserFrame.java in Android before 4.4 uses the addJavascriptInterface API in conjunction with creating an object of the SearchBoxImpl class, which allows attackers to execute arbitrary Java code by leveraging access to the searchBoxJavaBridge_ interface at certain Android API levels.
network
low complexity
google lenovo CWE-94
7.5