CVE-2013-6775
CVSS10.0
发布时间 :2014-03-31 10:58:57
修订时间 :2014-03-31 15:08:03
NMCOS    

[原文]The Chainfire SuperSU package before 1.69 for Android allows attackers to gain privileges via the (1) backtick or (2) $() type of shell metacharacters in the -c option to /system/xbin/su.


[CNNVD]Chainfire SuperSU 任意命令执行漏洞(CNNVD-201311-224)

        Chainfire SuperSU是一套安卓手机超级用户授权工具。该工具通过授予应用程序root权限,可掌握手机的控制权。
        Chainfire SuperSU 1.69之前的版本中存在任意命令执行漏洞。攻击者可利用该漏洞以root权限执行任意命令,可完全控制应用程序和底层设备。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-264 [权限、特权与访问控制]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6775
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6775
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-201311-224
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/archive/1/529797
(UNKNOWN)  BUGTRAQ  20131113 Android Superuser shell character escape vulnerability

- 漏洞信息

Chainfire SuperSU 任意命令执行漏洞
输入验证
2013-11-21 00:00:00 2013-11-21 00:00:00
远程  
        Chainfire SuperSU是一套安卓手机超级用户授权工具。该工具通过授予应用程序root权限,可掌握手机的控制权。
        Chainfire SuperSU 1.69之前的版本中存在任意命令执行漏洞。攻击者可利用该漏洞以root权限执行任意命令,可完全控制应用程序和底层设备。

- 公告与补丁

        目前厂商还没有提供此漏洞的相关补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        http://seclists.org/bugtraq/2013/Nov/58

- 漏洞信息

99880
Chainfire SuperSU for Android Command Injection Local Privilege Escalation Weakness
Local Access Required Input Manipulation
Loss of Integrity Upgrade
Exploit Public Coordinated Disclosure

- 漏洞描述

Chainfire SuperSU for Android contains a flaw that leads to unauthorized privileges being gained. The issue is due to the to get_command() returning COMMAND unescaped, which may allow a local attacker to inject arbitrary commands. This will allow the attacker to more easily gain elevated privileges.

- 时间线

2013-11-11 Unknow
2013-11-13 Unknow

- 解决方案

It has been reported that this issue has been fixed. Upgrade to version 1.69, or higher, to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Chainfire SuperSU CVE-2013-6775 Arbitrary Command Execution Vulnerability
Design Error 63715
Yes No
2013-11-13 12:00:00 2013-11-13 12:00:00
Kevin Cernekee

- 受影响的程序版本

- 漏洞讨论

Chainfire SuperSU is prone to an arbitrary command-execution vulnerability.

An attacker can leverage this issue to execute arbitrary commands with root privileges. Successful exploits will compromise the application and possibly the underlying device.

Chainfire SuperSU is vulnerable; other versions may also be affected.

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站