SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Device (VoIP/Phone/FAX)  >   Google Android Vendors:   Google
Google Android on Verizon Droid Lets Physically Local Users Bypass the Screen Lock
SecurityTracker Alert ID:  1023430
SecurityTracker URL:  http://securitytracker.com/id/1023430
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Jan 11 2010
Impact:   User access via local system
Vendor Confirmed:  Yes  
Version(s): 2.0.1
Description:   A vulnerability was reported in Google Android running on Verizon Droid. A physically local user can bypass the screen lock in certain cases.

When an incoming call is received on a device that has the unlock pattern feature enabled, a physically local user can select the 'Back' icon to access the 'Home' screen without having to enter the unlock pattern.

Verizon Droid phones are affected.

The Assurer reported this vulnerability.

The original advisory is available at:

https://theassurer.com/p/756.html

Impact:   A physically local user can bypass the screen lock in certain cases.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.google.com/ (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC