Vulnerability CVE-2014-7951


Published: 2020-02-20

Description:
Directory traversal vulnerability in the Android debug bridge (aka adb) in Android 4.0.4 allows physically proximate attackers with a direct connection to the target Android device to write to arbitrary files owned by system via a .. (dot dot) in the tar archive headers.

See advisories in our WLB2 database:
Topic
Author
Date
High
Android backup agent arbitrary code execution
Imre Rad
18.04.2015
Med.
ADB backup archive path traversal file overwrite
Imre Rad
18.04.2015

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Google -> Android 

 References:
http://packetstormsecurity.com/files/131510/ADB-Backup-Traversal-File-Overwrite.html
http://seclists.org/fulldisclosure/2015/Apr/51
http://www.securityfocus.com/bid/74211
https://android.googlesource.com/platform/frameworks/base/+/7bc601d%5E!/#F0
https://www.exploit-db.com/exploits/36813/

Copyright 2024, cxsecurity.com

 

Back to Top