Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-1149

Overview

Vulnerability Score 7.2 7.2
CVE Id CVE-2011-1149
Last Modified 22 Apr 2011 10:41:16
Published 21 Apr 2011 06:55:01
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2011-1149

Summary

Android before 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and ASHMEM_SET_PROT_MASK.

Vulnerable Systems

Operating System

  • Google Android 1.5

  • Google Android 1.6

  • Google Android 2.1

  • Google Android 2.2

  • Google Android 2.2.1

  • Google Android 2.2.2


References

MISC - https://github.com/tmzt/g2root-kmod/tree/scotty2/scotty2

CONFIRM - http://android.git.kernel.org/?p=platform/system/core.git;a=commit;h=25b15be9120bcdaa0aba622c67ad2c835d9e91ca

CONFIRM - http://android.git.kernel.org/?p=kernel/common.git;a=commit;h=c98a285075f26e2b17a5baa2cb3eb6356a75597e

CONFIRM - http://groups.google.com/group/android-security-discuss/browse_thread/thread/15f97658c88d6827/e86db04652651971?show_docid=e86db04652651971

MISC - http://forum.xda-developers.com/wiki/index.php?title=HTC_Vision#Rooting_the_G2

MISC - http://c-skills.blogspot.com/2011/01/adb-trickery-again.html


Last Updated: 27 May 2016 10:56:11