Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 8 Nov 2011 08:08:35 -0500
From: Dan Rosenberg <dan.j.rosenberg@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: Android: vold stack buffer overflow

On Tue, Nov 8, 2011 at 8:03 AM, Dan Rosenberg <dan.j.rosenberg@...il.com> wrote:
> A local user with group "log" on Android may send a malformed message
> to vold ("volume daemon"), causing a stack buffer overflow.  This has
> been demonstrated to be exploitable to escalate privileges to root on
> all Froyo (2.2.x) and Gingerbread (2.4.x)  devices via freeing an
> arbitrary heap object and triggering a use-after-free condition [1].
> It appears the bug was silently patched in Honeycomb (3.x), but note
> that since Honeycomb is not open source, it does not fall within the
> scope of this list.  Bug discovered and exploited by the Revolutionary
> team [2].
>

Oops, a few minor corrections.

Typo: Gingerbread is 2.3.x.  Also, the vulnerability actually lives in
the libsysutils library, and was demonstrated to be exploitable via
vold, which makes use of the affected library function.  Sorry for the
noise.

> -Dan
>
> [1] https://github.com/revolutionary/zergRush/blob/master/zergRush.c
> [2] http://revolutionary.io/
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ