CVE-2013-6770

The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.3 and 4.4 does not properly restrict the set of users who can execute /system/xbin/su with the --daemon option, which allows attackers to gain privileges by leveraging ADB shell access and a certain Linux UID, and then creating a Trojan horse script.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:koushik_dutta:superuser:1.0.2.1:*:*:*:*:*:*:*
OR cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*
cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:59

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/529795 - Exploit () http://www.securityfocus.com/archive/1/529795 - Exploit

Information

Published : 2014-03-31 14:58

Updated : 2024-11-21 01:59


NVD link : CVE-2013-6770

Mitre link : CVE-2013-6770

CVE.ORG link : CVE-2013-6770


JSON object : View

Products Affected

koushik_dutta

  • superuser

google

  • android
CWE
CWE-264

Permissions, Privileges, and Access Controls