← Volver a CVEs
CVE-2011-1823
HIGHCISA KEV7.8
Descripcion
The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in the DirectVolume::handlePartitionAdded method, which triggers memory corruption, as demonstrated by Gingerbreak.
Detalles CVE
Puntuacion CVSS v3.17.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado6/9/2011
Ultima modificacion4/21/2026
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorAndroid
ProductoAndroid OS
Nombre vulnerabilidadAndroid OS Privilege Escalation Vulnerability
Fecha inclusion KEV2022-09-08
Fecha limite remediacion2022-09-29
Uso en ransomwareUnknown
Productos afectados
google:android
Debilidades (CWE)
CWE-190CWE-190
Referencias
http://android.git.kernel.org/?p=platform/system/core.git%3Ba=commit%3Bh=b620a0b1c7ae486e979826200e8e441605b0a5d6(cve@mitre.org)
http://android.git.kernel.org/?p=platform/system/netd.git%3Ba=commit%3Bh=79b579c92afc08ab12c0a5788d61f2dd2934836f(cve@mitre.org)
http://android.git.kernel.org/?p=platform/system/vold.git%3Ba=commit%3Bh=c51920c82463b240e2be0430849837d6fdc5352e(cve@mitre.org)
http://forum.xda-developers.com/showthread.php?t=1044765(cve@mitre.org)
http://www.androidpolice.com/2011/05/03/google-patches-gingerbreak-exploit-but-dont-worry-we-still-have-root-for-now/(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67977(cve@mitre.org)
http://android.git.kernel.org/?p=platform/system/core.git%3Ba=commit%3Bh=b620a0b1c7ae486e979826200e8e441605b0a5d6(af854a3a-2127-422b-91ae-364da2661108)
http://android.git.kernel.org/?p=platform/system/netd.git%3Ba=commit%3Bh=79b579c92afc08ab12c0a5788d61f2dd2934836f(af854a3a-2127-422b-91ae-364da2661108)
http://android.git.kernel.org/?p=platform/system/vold.git%3Ba=commit%3Bh=c51920c82463b240e2be0430849837d6fdc5352e(af854a3a-2127-422b-91ae-364da2661108)
http://androidcommunity.com/gingerbreak-root-for-gingerbread-app-20110421/(af854a3a-2127-422b-91ae-364da2661108)
http://c-skills.blogspot.com/2011/04/yummy-yummy-gingerbreak.html(af854a3a-2127-422b-91ae-364da2661108)
http://forum.xda-developers.com/showthread.php?t=1044765(af854a3a-2127-422b-91ae-364da2661108)
http://www.androidpolice.com/2011/05/03/google-patches-gingerbreak-exploit-but-dont-worry-we-still-have-root-for-now/(af854a3a-2127-422b-91ae-364da2661108)
http://xorl.wordpress.com/2011/04/28/android-vold-mpartminors-signedness-issue/(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67977(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2011-1823(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.