Untrusted search path vulnerability in the ChainsDD Superuser package 3.1.3 for Android 4.2.x and earlier, CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and earlier, and Chainfire SuperSU package before 1.69 for Android 4.2.x and earlier allows attackers to load an arbitrary .jar file and gain privileges via a crafted BOOTCLASSPATH environment variable for a /system/xbin/su process. NOTE: another researcher was unable to reproduce this with ChainsDD Superuser.
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
AV:N/AC:L/Au:N/C:C/I:C/A:C
Vendors | Products |
---|---|
Chainfire |
|
Koushik Dutta |
|
|
|
Androidsu |
|
Configuration 1 [-]
AND |
|
Configuration 2 [-]
AND |
|
Configuration 3 [-]
AND |
|
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/529796 | Exploit |
http://www.securityfocus.com/archive/1/529822 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2014-03-30T10:00:00
Updated: 2014-03-30T06:57:00
Reserved: 2013-11-10T00:00:00
Link: CVE-2013-6774
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-03-31T14:58:57.790
Modified: 2015-11-10T19:12:54.230
Link: CVE-2013-6774
JSON object: View
Redhat Information
No data.
CWE