First published: Thu Apr 21 2011(Updated: )
Android before 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and ASHMEM_SET_PROT_MASK.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | <=2.2.2 | |
Android | =1.5 | |
Android | =1.6 | |
Android | =2.1 | |
Android | =2.2-rev1 | |
Android | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1149 is considered a critical vulnerability that allows local applications to bypass the application sandbox on vulnerable Android versions.
CVE-2011-1149 affects Android versions up to and including 2.2.2.
The best mitigation for CVE-2011-1149 is to upgrade to a newer version of Android that is not affected by this vulnerability.
CVE-2011-1149 is exploited through methods such as psneuter and KillingInTheNameOf, which allow privilege escalation.
There is no direct patch available for CVE-2011-1149; upgrading to a secure version of Android is the recommended solution.