Arbitrary Code Execution and Denial of Service Vulnerability in DIAG Kernel-Mode Driver

Arbitrary Code Execution and Denial of Service Vulnerability in DIAG Kernel-Mode Driver

CVE-2012-4220 · MEDIUM Severity

AV:N/AC:M/AU:N/C:P/I:P/A:P

diagchar_core.c in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver for Android 2.3 through 4.2 allows attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via an application that uses crafted arguments in a local diagchar_ioctl call.

Learn more about our Cis Benchmark Audit For Google Android.