Permissions, Privileges, and Access Controls in Google Android - CVE-2011-1149
Published: April 21, 2011 / Updated: August 11, 2020
Google Android
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Android before 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and ASHMEM_SET_PROT_MASK.
How to mitigate CVE-2011-1149
Sources
- http://android.git.kernel.org/?p=kernel/common.git;a=commit;h=c98a285075f26e2b17a5baa2cb3eb6356a75597e
- http://android.git.kernel.org/?p=platform/system/core.git;a=commit;h=25b15be9120bcdaa0aba622c67ad2c835d9e91ca
- http://c-skills.blogspot.com/2011/01/adb-trickery-again.html
- http://forum.xda-developers.com/wiki/index.php?title=HTC_Vision#Rooting_the_G2
- http://groups.google.com/group/android-security-discuss/browse_thread/thread/15f97658c88d6827/e86db04652651971?show_docid=e86db04652651971
- https://github.com/tmzt/g2root-kmod/tree/scotty2/scotty2