Name | CVE-2014-1909 |
Description | Integer signedness error in system/core/adb/adb_client.c in Android Debug Bridge (ADB) for Android 4.4 in the Android SDK Platform Tools 18.0.1 allows ADB servers to execute arbitrary code via a negative length value, which bypasses a signed comparison and triggers a stack-based buffer overflow. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 770513 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
android-platform-system-core (PTS) | jessie | 21-6 | vulnerable |
stretch | 1:7.0.0+r33-1 | fixed | |
buster | 1:8.1.0+r23-5 | fixed | |
bullseye | 1:10.0.0+r36-7 | fixed | |
android-tools (PTS) | jessie | 4.2.2+git20130529-5.1 | fixed |
buster | 5.1.1.r38-1.1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
android-platform-system-core | source | (unstable) | 1:6.0.0+r26-1~stage1 | |||
android-tools | source | (unstable) | 4.2.2+git20130529-5.1 | 770513 |
[jessie] - android-platform-system-core <no-dsa> (Minor issue)
http://www.droidsec.org/advisories/2014/02/04/two-security-issues-found-in-the-android-sdk-tools.html