Vulnerability Details : CVE-2011-1149
Android before 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and ASHMEM_SET_PROT_MASK.
Products affected by CVE-2011-1149
- cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:1.5:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:1.6:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-1149
0.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1149
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2011-1149
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1149
-
http://groups.google.com/group/android-security-discuss/browse_thread/thread/15f97658c88d6827/e86db04652651971?show_docid=e86db04652651971
KillingInTheNameOf patch - Google Groepen
-
http://android.git.kernel.org/?p=platform/system/core.git;a=commit;h=25b15be9120bcdaa0aba622c67ad2c835d9e91ca
Patch
-
http://forum.xda-developers.com/wiki/index.php?title=HTC_Vision#Rooting_the_G2
HTC Vision - XDA-DevelopersExploit
-
http://c-skills.blogspot.com/2011/01/adb-trickery-again.html
C-skills: adb trickery #2
-
https://github.com/tmzt/g2root-kmod/tree/scotty2/scotty2
g2root-kmod/scotty2 at scotty2 · tmzt/g2root-kmod · GitHubPatch
-
http://android.git.kernel.org/?p=kernel/common.git;a=commit;h=c98a285075f26e2b17a5baa2cb3eb6356a75597e
Patch
Jump to