7.2
CVSSv2

CVE-2013-6282

Published: 20/11/2013 Updated: 08/12/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 732
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The (1) get_user and (2) put_user API functions in the Linux kernel prior to 3.5.5 on the v6k and v7 ARM platforms do not validate certain addresses, which allows malicious users to read or modify the contents of arbitrary kernel memory locations via a crafted application, as exploited in the wild against Android devices in October and November 2013.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Several security issues were fixed in the kernel ...

Exploits

This Metasploit module exploits a missing check in the get_user and put_user API functions in the linux kernel before 355 The missing checks on these functions allow an unprivileged user to read and write kernel memory This exploit first reads the kernel memory to identify the commit_creds and ptmx_fops address, then uses the write primitive to ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'rex' class MetasploitModule < Msf::Exploit::Local Rank = ExcellentRanking include Msf::Post::File include Msf::Post::Common def initialize(info={}) super( update_info ...
/* * Just a lame binder local root exploit stub Somewhat messy but whatever The bug was reported in CVE-2013-6282 * * Tested on Android 422 and 44 Kernels 3057, 345 and few more All up to 345 unpatched should be vulnerable * You need to customize the addresses so that they match the target board On Android, both /proc/kallsyms a ...

Github Repositories

Proof of concept Expat MDM solution as part of a paper on Android patching

Expat MDM Proof of concept Expat MDM solution as part of a paper on Android patching Paper Presentation Abstract Android is currently the most popular smartphone OS in the world Many di�erent devices with outdated Android versions and kernels pose a risk as they become a potential target for attackers, making enterprises reluctant to allow employees to bring their Android de

Root LG Fireweb

LG Fireweb exploit This is an implementation of CVE-2013-6282 vulnerability Requeriments Android NDK with arm-linux-androideabi-49 tools and android-21 support Android SDK with adb on path Building Clone this repo: githubcom/Gioyik/lg-fireweb-exploit Go inside the the folder and run: /path-to-android-ndk/arm-linux-androideabi-49/subfolders-path/bin/arm-linux-andro

write my own android kernel exp.

Android CVE Study Intro This project will analyze android CVEs List CVE-2013-6282

CVE-2013-6282 exploit

This library read in kernel memory by CVE-2013-6282 exploit

CVE-2013-6282 proof of concept for Android

BUILDING: Download the android ndk, eg: dlgooglecom/android/repository/android-ndk-r10e-linux-x86_64zip (I used android-ndk-10d) Unzip it and install ensure ndk-build is in your PATH $ make root ndk-build NDK_PROJECT_PATH= APP_BUILD_SCRIPT=/Androidmk APP_PLATFORM=android-16 APP_ABI=armeabi make[1]: Entering directory '/home/user/dev/git/exploits/CVE-2013-628

Unlock security module, obtain root privilege and so on.

backdoor_mmap_tools This code is still ugly, please re-write it and send pull-requests, if you want to use this How to use Install mmap backdoor install_backdoor Uninstall mmap backdoor install_backdoor -u Run shell with temporary root privilege run_root_shell Run command "/data/local/autoexecsh" with root privilege run_autoexec Fix CVE-2013-6282 vulnera

Unlock security module, obtain root privilege and so on.

backdoor_mmap_tools This code is still ugly, please re-write it and send pull-requests, if you want to use this How to use Install mmap backdoor install_backdoor Uninstall mmap backdoor install_backdoor -u Run shell with temporary root privilege run_root_shell Run command "/data/local/autoexecsh" with root privilege run_autoexec Fix CVE-2013-6282 vulnera

Android app to bypass loadable kernel module authentication

Bypass LKM Use this app to bypass loadable kernel module authentication on Android phones This is handy when you're developing your own modules or you've mixed and matched OS and firmware versions A few offsets are included but if your phone is not listed, you'll need to follow the instructions here to find your offset (requires a disassembler) Use Android St