CVE-2014-3100
Stack-based buffer overflow in the encode_key function in /system/bin/keystore in the KeyStore service in Android 4.3 allows attackers to execute arbitrary code, and consequently obtain sensitive key information or bypass intended restrictions on cryptographic operations, via a long key name.
Ver en NVDSeveridad
N/A
EPSS
Probabilidad de explotación (próx. 30 días): 0.0104 (1.0%)
Percentil: 77.5%
EPSS: 2026-05-06
Afecta
google:androidDescripción técnica
Stack-based buffer overflow in the encode_key function in /system/bin/keystore in the KeyStore service in Android 4.3 allows attackers to execute arbitrary code, and consequently obtain sensitive key information or bypass intended restrictions on cryptographic operations, via a long key name.
Publicada: 2/7/2014, 4:14:17
Última modificación: 6/5/2026, 22:30:45
Referencias
- http://packetstormsecurity.com/files/127185/Android-KeyStore-Stack-Buffer-Overflow.html
- http://securityintelligence.com/android-keystore-stack-buffer-overflow-to-keep-things-simple-buffers-are-always-larger-than-needed/
- http://www.securityfocus.com/archive/1/532527/100/0/threaded
- http://www.securityfocus.com/bid/68152
- http://www.slideshare.net/ibmsecurity/android-keystorestackbufferoverflow
- http://packetstormsecurity.com/files/127185/Android-KeyStore-Stack-Buffer-Overflow.html
- http://securityintelligence.com/android-keystore-stack-buffer-overflow-to-keep-things-simple-buffers-are-always-larger-than-needed/
- http://www.securityfocus.com/archive/1/532527/100/0/threaded