Vulnerability
CVE-2013-3051
Component: BOOT
Location: OS
The TrustZone kernel, when used in conjunction with a certain Motorola build of Android 4.1.2, on Motorola Razr HD, Razr M, and Atrix HD devices with the Qualcomm MSM8960 chipset does not verify the association between a certain physical-address argument and a memory region, which allows local users to unlock the bootloader by using kernel mode to perform crafted 0x9 and 0x2 SMC operations, a different vulnerability than CVE-2013-2596.
Impact
Severity (Manufact.)
N/A
Severity (NIST)
N/A
Severity (Android)
N/A
Chipsets
1
Devices
30
Affected Hardware
Name | Also known as | Manufacturer |
---|---|---|
MSM8960 | Qualcomm |
1 of 1 row(s) shown.
Rows per page
Page 1 of 1
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2012
Reported:
Unknown
Advisory Published:
N/A
CVE Published:
Apr 13, 2013
Android Patch Level:
None