The vulnerability was exploited against Android devices in October and November 2013. The vulnerability is originally in SE Linux kernel.
Advisory: SB2013102501 - Privilege escalation in Google Android
Vulnerable component: Google Android
CVSSv3 score: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
CWE-ID: CWE-20 - Improper input validation
The vulnerability allows a local attacker to obtain elevated privileges on the target system.
The weakness exists due to an error in the put_user/get_user kernel API. A local attacker can use a malicious application to read and write kernel memory and gain kernel privileges on the system.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
- Linux Kernel < 3.4.5 (Android 4.2.2 / 4.4 ARM) - Privilege Escalation [Exploit-DB]
- Android - get_user/put_user Exploit (Metasploit) [Exploit-DB]