Vulnerability Details : CVE-2013-4787
Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic signature, probably involving multiple entries in a Zip file with the same name in which one entry is validated but the other entry is installed, aka Android security bug 8219321 and the "Master Key" vulnerability.
Vulnerability category: Execute code
Products affected by CVE-2013-4787
- cpe:2.3:o:google:android:1.6:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-4787
51.78%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-4787
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2013-4787
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-4787
-
http://www.zdnet.com/google-releases-fix-to-oems-for-blue-security-android-security-hole-7000017782/
Google releases fix to OEMs for Blue Security Android security hole | ZDNet
-
https://plus.google.com/113331808607528811927/posts/GxDA6111vYy
Inloggen - Google Accounts
-
http://bluebox.com/corporate-blog/bluebox-uncovers-android-master-key/
Not Found
-
https://jira.cyanogenmod.org/browse/CYAN-1602
-
http://www.securityfocus.com/bid/60952
Google Android 'APK' code Remote Security Bypass Vulnerability
-
http://review.cyanogenmod.org/#/c/45251/
Jump to