{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Samsung Galaxy Note ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Samsung Galaxy Note 2 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Samsung Galaxy S3 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Samsung Galaxy S2 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Samsung Galaxy Note 10.1.","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"closed_at":"2012-12-18","content":"## Solution\n\nLe CERTA recommande l'installation de la version 4.1.2 (compilation\nJZO54K) du syst\u00e8me Android corrigeant cette vuln\u00e9rabilit\u00e9.\n","cves":[],"links":[],"reference":"CERTA-2012-ALE-008","revisions":[{"description":"version initiale.","revision_date":"2012-12-18T00:00:00.000000"}],"risks":[{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte sur des terminaux \u00e9quip\u00e9s du\ncomposant \u00abExynos 4\u00bb (<span class=\"textit\">Exynos 4210</span> ou <span\nclass=\"textit\">Exynos 4412</span>) de Samsung. Le pilote de ce composant\npermet \u00e0 une application d'\u00e9lever ses privil\u00e8ges sur le syst\u00e8me et\nd'ex\u00e9cuter du code en tant qu'administrateur (<span\nclass=\"textit\">root</span>).\n\nLa liste des syst\u00e8mes affect\u00e9s pourrait potentiellement \u00eatre \u00e9tendue \u00e0\ndes terminaux d'autres marques \u00e9quip\u00e9s du composant \u00abExynos 4\u00bb et du\npilote Samsung correspondant.\n","title":"Vuln\u00e9rabilit\u00e9 dans certains terminaux Samsung","vendor_advisories":[]}
