Android One Privilege Escalation

Discussion in 'News Aggregator' started by Packet Storm, 26 Mar 2016.

  1. Packet Storm

    Packet Storm Guest

    The wireless driver for the Android One (sprout) devices has a bad copy_from_user in the handling for the wireless driver socket private read ioctl IOCTL_GET_STRUCT with subcommand PRIV_CMD_SW_CTRL. This ioctl is permitted for access from the untrusted-app selinux domain, so this is an app-to-kernel privilege escalation from any app with android.permission.INTERNET.

    Continue reading...
     

Share This Page

Loading...