Android vold Daemon Crafted FrameworkCommand Local Privilege Escalation (zergRush)
Mobile Phone / Hand-held Device
Input Manipulation
Loss of Integrity
Upgrade
Exploit Public
Uncoordinated Disclosure
-
漏洞描述
Android is prone to an overflow condition. The vold daemon fails to properly sanitize user-supplied input when parsing specially crafted FrameworkCommands, causing a stack based buffer overflow. When the overflow occurs, the exploit returns to a chain of Return Oriented Exploitation (ROP) gaddgets that execute as root, escalating the attacker's privileges.
-
时间线
2011-10-10
Unknow
2011-10-10
Unknow
-
解决方案
Upgrade to version Honeycomb (3.0) or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.