Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2011-1823

The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in the DirectVolume::handlePartitionAdded method, which triggers memory corruption, as demonstrated by Gingerbreak.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.468
EPSS Ranking 97.6%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 7.2
Proposed Action
The vold volume manager daemon in Android kernel trusts messages from a PF_NETLINK socket, which allows an attacker to execute code and gain root privileges. This vulnerability is associated with GingerBreak and Exploit.AndroidOS.Lotoor.
Ransomware Campaign
Unknown
References
Products affected by CVE-2011-1823
  • Google » Android » Version: 2.0
    cpe:2.3:o:google:android:2.0
  • Google » Android » Version: 2.0.1
    cpe:2.3:o:google:android:2.0.1
  • Google » Android » Version: 2.0.3
    cpe:2.3:o:google:android:2.0.3
  • Google » Android » Version: 2.1
    cpe:2.3:o:google:android:2.1
  • Google » Android » Version: 2.2
    cpe:2.3:o:google:android:2.2
  • Google » Android » Version: 2.2.1
    cpe:2.3:o:google:android:2.2.1
  • Google » Android » Version: 2.2.2
    cpe:2.3:o:google:android:2.2.2
  • Google » Android » Version: 2.2.3
    cpe:2.3:o:google:android:2.2.3
  • Google » Android » Version: 2.3
    cpe:2.3:o:google:android:2.3
  • Google » Android » Version: 2.3.1
    cpe:2.3:o:google:android:2.3.1
  • Google » Android » Version: 2.3.2
    cpe:2.3:o:google:android:2.3.2
  • Google » Android » Version: 2.3.3
    cpe:2.3:o:google:android:2.3.3
  • Google » Android » Version: 3.0
    cpe:2.3:o:google:android:3.0


Contact Us

Shodan ® - All rights reserved