Vulnerability Name:

CVE-2013-4787 (CCN-85500)

Assigned:2013-07-03
Published:2013-07-03
Updated:2013-10-11
Summary:Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic signature, probably involving multiple entries in a Zip file with the same name in which one entry is validated but the other entry is installed, aka Android security bug 8219321 and the "Master Key" vulnerability.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.3 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-310
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: Bluebox Security Corporate Blog
Uncovering Android Master Key That Makes 99% of Devices Vulnerable

Source: MISC
Type: UNKNOWN
http://bluebox.com/corporate-blog/bluebox-uncovers-android-master-key/

Source: CCN
Type: Google Web site
Android

Source: MITRE
Type: CNA
CVE-2013-4787

Source: MISC
Type: UNKNOWN
http://review.cyanogenmod.org/#/c/45251/

Source: OSVDB
Type: UNKNOWN
94773

Source: BID
Type: UNKNOWN
60952

Source: CCN
Type: BID-60952
Google Android 'APK' code Remote Security Bypass Vulnerability

Source: MISC
Type: UNKNOWN
http://www.zdnet.com/google-releases-fix-to-oems-for-blue-security-android-security-hole-7000017782/

Source: XF
Type: UNKNOWN
google-android-apk-sec-bypass(85500)

Source: MISC
Type: UNKNOWN
https://jira.cyanogenmod.org/browse/CYAN-1602

Source: MISC
Type: UNKNOWN
https://plus.google.com/113331808607528811927/posts/GxDA6111vYy

Vulnerable Configuration:Configuration 1:
  • cpe:/o:google:android:1.6:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.2:rev1:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3:rev1:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3.3:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3.4:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3.5:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3.6:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3.7:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.2.6:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:google:android:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    google android 1.6
    google android 2.0
    google android 2.0.1
    google android 2.1
    google android 2.2
    google android 2.2 rev1
    google android 2.2.1
    google android 2.2.2
    google android 2.2.3
    google android 2.3
    google android 2.3 rev1
    google android 2.3.1
    google android 2.3.2
    google android 2.3.3
    google android 2.3.4
    google android 2.3.5
    google android 2.3.6
    google android 2.3.7
    google android 3.0
    google android 3.1
    google android 3.2
    google android 3.2.1
    google android 3.2.2
    google android 3.2.4
    google android 3.2.6
    google android 4.0
    google android 4.0.1
    google android 4.0.2
    google android 4.0.3
    google android 4.0.4
    google android 4.1
    google android 4.1.2
    google android 4.2
    google android *