ID

VAR-201402-0145


CVE

CVE-2013-4737


TITLE

MSM For devices Qualcomm Innovation Center Android Used for contributions etc. Linux Kernel for CONFIG_STRICT_MEMORY_RWX Vulnerability that can bypass access restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2013-006056

DESCRIPTION

The CONFIG_STRICT_MEMORY_RWX implementation for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly consider certain memory sections, which makes it easier for attackers to bypass intended access restrictions by leveraging the presence of RWX memory at a fixed location. There is a security bypass vulnerability in the camera driver provided by Code Aurora. There is a problem with the CONFIG_STRICT_MEMORY_RWX implementation on the Linux kernel 3.x used by the Code Aurora device. When CONFIG_STRICT_MEMORY_RWX is set, the first segment of memory (including the kernel page table and initial code) and the segment containing the init code are set with RWX permissions. Allows an attacker to provide fixed-location read and write, execute content to bypass security restrictions, and more easily perform kernel exploits. This may aid in further attacks. Android for MSM is an Android MSM project, the main purpose of this project is to build an Android platform that includes Qualcomm MSM chipset. There is a security vulnerability in the implementation of the CONFIG_STRICT_MEMORY_RWX function of the Linux kernel version 3.10 used in QuIC Android contributions for MSM devices. The vulnerability stems from the fact that the program does not manage memory correctly

Trust: 2.52

sources: NVD: CVE-2013-4737 // JVNDB: JVNDB-2013-006056 // CNVD: CNVD-2014-01115 // BID: 65630 // VULHUB: VHN-64739

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-01115

AFFECTED PRODUCTS

vendor:qualcommmodel:quic mobile station modem kernelscope:eqversion:3.10

Trust: 1.6

vendor:qualcommmodel:quic mobile station modemscope:eqversion:3.10

Trust: 0.8

vendor:codemodel:aurora forum android for msmscope: - version: -

Trust: 0.6

vendor:codemodel:aurora forum firefox os for msmscope: - version: -

Trust: 0.6

vendor:codemodel:aurora forum qrd androidscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2014-01115 // JVNDB: JVNDB-2013-006056 // CNNVD: CNNVD-201402-218 // NVD: CVE-2013-4737

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-4737
value: HIGH

Trust: 1.0

NVD: CVE-2013-4737
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-01115
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201402-218
value: CRITICAL

Trust: 0.6

VULHUB: VHN-64739
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-4737
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-01115
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-64739
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-01115 // VULHUB: VHN-64739 // JVNDB: JVNDB-2013-006056 // CNNVD: CNNVD-201402-218 // NVD: CVE-2013-4737

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-64739 // JVNDB: JVNDB-2013-006056 // NVD: CVE-2013-4737

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201402-218

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201402-218

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-006056

PATCH

title:QCIR-2013-00006-1url:https://www.codeaurora.org/projects/security-advisories/configstrictmemoryrwx-not-strictly-enforced-cve-2013-4737

Trust: 0.8

title:Code Aurora multiple products 'CONFIG_STRICT_MEMORY_RWX' security bypass vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/43741

Trust: 0.6

title:4256415b296348ff16cd17a5b8f8dce4dea37328url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=48086

Trust: 0.6

sources: CNVD: CNVD-2014-01115 // JVNDB: JVNDB-2013-006056 // CNNVD: CNNVD-201402-218

EXTERNAL IDS

db:NVDid:CVE-2013-4737

Trust: 3.4

db:BIDid:65630

Trust: 1.0

db:JVNDBid:JVNDB-2013-006056

Trust: 0.8

db:CNNVDid:CNNVD-201402-218

Trust: 0.7

db:CNVDid:CNVD-2014-01115

Trust: 0.6

db:VULHUBid:VHN-64739

Trust: 0.1

sources: CNVD: CNVD-2014-01115 // VULHUB: VHN-64739 // BID: 65630 // JVNDB: JVNDB-2013-006056 // CNNVD: CNNVD-201402-218 // NVD: CVE-2013-4737

REFERENCES

url:https://www.codeaurora.org/projects/security-advisories/configstrictmemoryrwx-not-strictly-enforced-cve-2013-4737

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4737

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4737

Trust: 0.8

url:http://www.kernel.org/

Trust: 0.3

sources: CNVD: CNVD-2014-01115 // VULHUB: VHN-64739 // BID: 65630 // JVNDB: JVNDB-2013-006056 // CNNVD: CNNVD-201402-218 // NVD: CVE-2013-4737

CREDITS

Georg Wicherski of CrowdStrike

Trust: 0.3

sources: BID: 65630

SOURCES

db:CNVDid:CNVD-2014-01115
db:VULHUBid:VHN-64739
db:BIDid:65630
db:JVNDBid:JVNDB-2013-006056
db:CNNVDid:CNNVD-201402-218
db:NVDid:CVE-2013-4737

LAST UPDATE DATE

2025-04-11T22:53:07.074000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-01115date:2014-02-20T00:00:00
db:VULHUBid:VHN-64739date:2014-02-18T00:00:00
db:BIDid:65630date:2014-02-18T00:00:00
db:JVNDBid:JVNDB-2013-006056date:2014-02-19T00:00:00
db:CNNVDid:CNNVD-201402-218date:2014-02-20T00:00:00
db:NVDid:CVE-2013-4737date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-01115date:2014-02-20T00:00:00
db:VULHUBid:VHN-64739date:2014-02-15T00:00:00
db:BIDid:65630date:2014-02-18T00:00:00
db:JVNDBid:JVNDB-2013-006056date:2014-02-19T00:00:00
db:CNNVDid:CNNVD-201402-218date:2014-02-20T00:00:00
db:NVDid:CVE-2013-4737date:2014-02-15T14:57:07.737