{
  "name" : "Diaggetroot",
  "CVE" : [["CVE-2012-4220", "kc-blog-diaggetroot"]],
  "Coordinated_disclosure" : "false",
  "Categories" : ["system"],
  "Details" : [["A vulnerability in the Qualcomm Innovation Center (QuIC) Diagnostics (aka DIAG) kernel-mode driver allows arbitrary code execution or denial of service via a call to diagchar_ioctl", "kc-blog-diaggetroot"]],
  "Discovered_by" : [["goroh kun", "android-paper"], ["giantprune", "kc-blog-diaggetroot"]],
  "Discovered_on" : [],
  "Submission" : [{"by":"dcc52", "on":"2019-07-08"}],
  "Reported_on" : [["2012-12-28", "xda-developers-diaggetroot"]],
  "Fixed_on" : [],
  "Fix_released_on" : [],
  "Affected_versions" : [["2.3 to 4.2", "kc-blog-diaggetroot"]],
  "Affected_devices" : [["HTC J Butterfly", "android-paper"]],
  "Affected_versions_regexp" : ["(2\\.[3-9]\\.[0-9])|(3\\.[0-9]\\.[0-9])|(4\\.[0-2]\\.[0-9])"],
  "Affected_manufacturers" : [["HTC", "android-paper"]],
  "Fixed_versions" : [],
  "references" : {
    "kc-blog-diaggetroot": {
      "url" : "http://zomo.herokuapp.com/blog/2015/05/25/rooting-methods/",
      "archiveurl" : "https://perma.cc/9GX7-BX5R"
    },
    "android-paper" : {
      "url" : "https://www.researchgate.net/publication/323635885_A_survey_of_Android_exploits_in_the_wild"
    },
    "xda-developers-diaggetroot" : {
      "url" : "https://forum.xda-developers.com/showthread.php?t=2069754"
    }
  },
  "Surface": ["app", "usb-debug"],
  "Vector": ["memory-corruption"],
  "Target": ["driver"],
  "Channel": ["app-execution", "shell"],
  "Condition": ["affected-app-installed", "usb-debug"],
  "Privilege": ["kernel"]
}
