Stack-based buffer overflow in Google Android - CVE-2014-3100
Published: July 2, 2014 / Updated: August 10, 2020
Google Android
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the encode_key function in /system/bin/keystore in the KeyStore service when processing a long key name. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2014-3100
Sources
- http://packetstormsecurity.com/files/127185/Android-KeyStore-Stack-Buffer-Overflow.html
- http://securityintelligence.com/android-keystore-stack-buffer-overflow-to-keep-things-simple-buffers-are-always-larger-than-needed/
- http://www.securityfocus.com/archive/1/532527/100/0/threaded
- http://www.securityfocus.com/bid/68152
- http://www.slideshare.net/ibmsecurity/android-keystorestackbufferoverflow