First published: Sun Mar 30 2014(Updated: )
The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.3 and 4.4 does not properly restrict the set of users who can execute /system/xbin/su with the --daemon option, which allows attackers to gain privileges by leveraging ADB shell access and a certain Linux UID, and then creating a Trojan horse script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Superuser | =1.0.2.1 | |
Android | =4.3 | |
Android | =4.4 | |
All of | ||
Superuser | =1.0.2.1 | |
Any of | ||
Android | =4.3 | |
Android | =4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-6770 is classified as high due to the potential for privilege escalation.
To fix CVE-2013-6770, it is recommended to update the Superuser package to a version that addresses this vulnerability.
CVE-2013-6770 affects the Koushik Dutta Superuser package version 1.0.2.1 on Android 4.3 and 4.4.
CVE-2013-6770 can be exploited through ADB shell access allowing attackers to gain elevated privileges.
CVE-2013-6770 is a local exploit, requiring access to the device via ADB for successful execution.