CVE-2014-3100
Stack-based buffer overflow in the encode_key function in /system/bin/keystore in the KeyStore service in Android 4.3 allows attackers to execute arbitrary code, and consequently obtain sensitive key information or bypass intended restrictions on cryptographic operations, via a long key name.
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.0104 (1.0%)
Percentile: 77.5%
EPSS: 2026-05-06
Affects
google:androidTechnical description
Stack-based buffer overflow in the encode_key function in /system/bin/keystore in the KeyStore service in Android 4.3 allows attackers to execute arbitrary code, and consequently obtain sensitive key information or bypass intended restrictions on cryptographic operations, via a long key name.
Published: 7/2/2014, 4:14:17 AM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://packetstormsecurity.com/files/127185/Android-KeyStore-Stack-Buffer-Overflow.html
- http://securityintelligence.com/android-keystore-stack-buffer-overflow-to-keep-things-simple-buffers-are-always-larger-than-needed/
- http://www.securityfocus.com/archive/1/532527/100/0/threaded
- http://www.securityfocus.com/bid/68152
- http://www.slideshare.net/ibmsecurity/android-keystorestackbufferoverflow
- http://packetstormsecurity.com/files/127185/Android-KeyStore-Stack-Buffer-Overflow.html
- http://securityintelligence.com/android-keystore-stack-buffer-overflow-to-keep-things-simple-buffers-are-always-larger-than-needed/
- http://www.securityfocus.com/archive/1/532527/100/0/threaded