Информационная безопасность
[RU] switch to English


Повышение привилегий в различных su-приложениях Android
Опубликовано:18 ноября 2013 г.
Источник:
SecurityVulns ID:13404
Тип:локальная
Уровень опасности:
3/10
Описание:Небезопасная работа с переменными окружениями и файловыми дискрипторами.
Затронутые продукты:CHAINSDD : ChainsDD Superuser 3.1
 CHAINFIRE : Chainfire SuperSU 1.68
CVE:CVE-2013-6775 (The Chainfire SuperSU package before 1.69 for Android allows attackers to gain privileges via the (1) backtick or (2) $() type of shell metacharacters in the -c option to /system/xbin/su.)
 CVE-2013-6774 (Untrusted search path vulnerability in the ChainsDD Superuser package 3.1.3 for Android 4.2.x and earlier, CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and earlier, and Chainfire SuperSU package before 1.69 for Android 4.2.x and earlier allows attackers to load an arbitrary .jar file and gain privileges via a crafted BOOTCLASSPATH environment variable for a /system/xbin/su process. NOTE: another researcher was unable to reproduce this with ChainsDD Superuser.)
 CVE-2013-6770 (The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.3 and 4.4 does not properly restrict the set of users who can execute /system/xbin/su with the --daemon option, which allows attackers to gain privileges by leveraging ADB shell access and a certain Linux UID, and then creating a Trojan horse script.)
 CVE-2013-6768 (Untrusted search path vulnerability in the CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and earlier allows attackers to trigger the launch of a Trojan horse app_process program via a crafted PATH environment variable for a /system/xbin/su process.)
Оригинальный текстdocumentKevin Cernekee, Superuser "su --daemon" vulnerability on Android >= 4.3 (18.11.2013)
 documentKevin Cernekee, Android Superuser shell character escape vulnerability (18.11.2013)
 documentKevin Cernekee, Superuser unsanitized environment vulnerability on Android <= 4.2.x (18.11.2013)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород