CVE-2014-1909

NameCVE-2014-1909
DescriptionInteger signedness error in system/core/adb/adb_client.c in Android Debug Bridge (ADB) for Android 4.4 in the Android SDK Platform Tools 18.0.1 allows ADB servers to execute arbitrary code via a negative length value, which bypasses a signed comparison and triggers a stack-based buffer overflow.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh (attack range: remote)
Debian Bugs770513

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
android-platform-system-core (PTS)jessie21-6vulnerable
stretch1:7.0.0+r33-1fixed
buster, sid1:8.1.0+r23-4fixed
android-tools (PTS)jessie4.2.2+git20130529-5.1fixed
buster, sid5.1.1.r38-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
android-platform-system-coresource(unstable)1:6.0.0+r26-1~stage1high
android-toolssource(unstable)4.2.2+git20130529-5.1high770513

Notes

[jessie] - android-platform-system-core <no-dsa> (Minor issue)
http://www.droidsec.org/advisories/2014/02/04/two-security-issues-found-in-the-android-sdk-tools.html

Search for package or bug name: Reporting problems