CVE-2011-1823
high-risk
Published 2011-06-09
The vold volume manager daemon on Android 3.0 and 2.x before 2.3.4 trusts messages that are received from a PF_NETLINK socket, which allows local users to execute arbitrary code and gain root privileges via a negative index that bypasses a maximum-only signed integer check in the DirectVolume::handlePartitionAdded method, which triggers memory corruption, as demonstrated by Gingerbreak.
Do I need to act?
!
38.3% chance of exploitation in next 30 days
EPSS score — higher than 62% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Vendors
References (19)
Press/Media Coverage
http://www.androidpolice.com/2011/05/03/google-patches-gingerbreak-exploit-but-d...
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/67977
Press/Media Coverage
http://www.androidpolice.com/2011/05/03/google-patches-gingerbreak-exploit-but-d...
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/67977
55
/ 100
high-risk
Severity
24/34 · High
Exploitability
24/34 · High
Exposure
7/34 · Low