Lucene search

K
nvd[email protected]NVD:CVE-2013-6774
HistoryMar 31, 2014 - 2:58 p.m.

CVE-2013-6774

2014-03-3114:58:57
web.nvd.nist.gov

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.5 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.9%

Untrusted search path vulnerability in the ChainsDD Superuser package 3.1.3 for Android 4.2.x and earlier, CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android 4.2.x and earlier, and Chainfire SuperSU package before 1.69 for Android 4.2.x and earlier allows attackers to load an arbitrary .jar file and gain privileges via a crafted BOOTCLASSPATH environment variable for a /system/xbin/su process. NOTE: another researcher was unable to reproduce this with ChainsDD Superuser.

Affected configurations

NVD
Node
chainfiresupersuMatch1.69android
AND
googleandroidMatch1.0
OR
googleandroidMatch1.1
OR
googleandroidMatch1.5
OR
googleandroidMatch1.6
OR
googleandroidMatch2.0
OR
googleandroidMatch2.0.1
OR
googleandroidMatch2.1
OR
googleandroidMatch2.2
OR
googleandroidMatch2.2rev1
OR
googleandroidMatch2.2.1
OR
googleandroidMatch2.2.2
OR
googleandroidMatch2.2.3
OR
googleandroidMatch2.3
OR
googleandroidMatch2.3rev1
OR
googleandroidMatch2.3.1
OR
googleandroidMatch2.3.2
OR
googleandroidMatch2.3.3
OR
googleandroidMatch2.3.4
OR
googleandroidMatch2.3.5
OR
googleandroidMatch2.3.6
OR
googleandroidMatch2.3.7
OR
googleandroidMatch3.0
OR
googleandroidMatch3.1
OR
googleandroidMatch3.2
OR
googleandroidMatch3.2.1
OR
googleandroidMatch3.2.2
OR
googleandroidMatch3.2.4
OR
googleandroidMatch3.2.6
OR
googleandroidMatch4.0
OR
googleandroidMatch4.0.1
OR
googleandroidMatch4.0.2
OR
googleandroidMatch4.0.3
OR
googleandroidMatch4.0.4
OR
googleandroidMatch4.1
OR
googleandroidMatch4.1.2
OR
googleandroidMatch4.2
OR
googleandroidMatch4.2.1
OR
googleandroidMatch4.2.2
Node
androidsuchainsdd_superuserMatch3.1.3android
AND
googleandroidMatch1.0
OR
googleandroidMatch1.1
OR
googleandroidMatch1.5
OR
googleandroidMatch1.6
OR
googleandroidMatch2.0
OR
googleandroidMatch2.0.1
OR
googleandroidMatch2.1
OR
googleandroidMatch2.2
OR
googleandroidMatch2.2rev1
OR
googleandroidMatch2.2.1
OR
googleandroidMatch2.2.2
OR
googleandroidMatch2.2.3
OR
googleandroidMatch2.3
OR
googleandroidMatch2.3rev1
OR
googleandroidMatch2.3.1
OR
googleandroidMatch2.3.2
OR
googleandroidMatch2.3.3
OR
googleandroidMatch2.3.4
OR
googleandroidMatch2.3.5
OR
googleandroidMatch2.3.6
OR
googleandroidMatch2.3.7
OR
googleandroidMatch3.0
OR
googleandroidMatch3.1
OR
googleandroidMatch3.2
OR
googleandroidMatch3.2.1
OR
googleandroidMatch3.2.2
OR
googleandroidMatch3.2.4
OR
googleandroidMatch3.2.6
OR
googleandroidMatch4.0
OR
googleandroidMatch4.0.1
OR
googleandroidMatch4.0.2
OR
googleandroidMatch4.0.3
OR
googleandroidMatch4.0.4
OR
googleandroidMatch4.1
OR
googleandroidMatch4.1.2
OR
googleandroidMatch4.2
OR
googleandroidMatch4.2.1
OR
googleandroidMatch4.2.2
Node
koushik_duttasuperuserMatch1.0.2.1
AND
googleandroidMatch1.0
OR
googleandroidMatch1.1
OR
googleandroidMatch1.5
OR
googleandroidMatch1.6
OR
googleandroidMatch2.0
OR
googleandroidMatch2.0.1
OR
googleandroidMatch2.1
OR
googleandroidMatch2.2
OR
googleandroidMatch2.2rev1
OR
googleandroidMatch2.2.1
OR
googleandroidMatch2.2.2
OR
googleandroidMatch2.2.3
OR
googleandroidMatch2.3
OR
googleandroidMatch2.3rev1
OR
googleandroidMatch2.3.1
OR
googleandroidMatch2.3.2
OR
googleandroidMatch2.3.3
OR
googleandroidMatch2.3.4
OR
googleandroidMatch2.3.5
OR
googleandroidMatch2.3.6
OR
googleandroidMatch2.3.7
OR
googleandroidMatch3.0
OR
googleandroidMatch3.1
OR
googleandroidMatch3.2
OR
googleandroidMatch3.2.1
OR
googleandroidMatch3.2.2
OR
googleandroidMatch3.2.4
OR
googleandroidMatch3.2.6
OR
googleandroidMatch4.0
OR
googleandroidMatch4.0.1
OR
googleandroidMatch4.0.2
OR
googleandroidMatch4.0.3
OR
googleandroidMatch4.0.4
OR
googleandroidMatch4.1
OR
googleandroidMatch4.1.2
OR
googleandroidMatch4.2
OR
googleandroidMatch4.2.1
OR
googleandroidMatch4.2.2

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

6.5 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.9%