The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.3 and 4.4 does not properly restrict the set of users who can execute /system/xbin/su with the --daemon option, which allows attackers to gain privileges by leveraging ADB shell access and a certain Linux UID, and then creating a Trojan horse script.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/529795 | Exploit |
http://www.securityfocus.com/archive/1/529795 | Exploit |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/529795 - Exploit |
Information
Published : 2014-03-31 14:58
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6770
Mitre link : CVE-2013-6770
CVE.ORG link : CVE-2013-6770
JSON object : View
Products Affected
koushik_dutta
- superuser
- android
CWE
CWE-264
Permissions, Privileges, and Access Controls