{
  "name" : "KillingInTheNameOf psneuter ashmem",
  "CVE" : [["CVE-2011-1149"]],
  "Coordinated_disclosure" : "false",
  "Categories" : ["system", "kernel"],
  "Details" : [["Android before 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges"]],
  "Discovered_by" : [],
  "Discovered_on" : [],
  "Submission" : [{"by":"drt24", "on":"2013-09-04"}],
  "Reported_on" : [{"date":"2011-01-06","bound":"before","ref":"c-skills-adb-trickery"}],
  "Fixed_on" : [["2010-07-13","ashmem-fix-core"],["2010-07-15","ashmem-fix-kernel"]],
  "Fix_released_on" : [["2010-12-06"]],
  "Affected_versions" : [["1.5 -- 2.2.2"]],
  "Affected_devices" : [["all"]],
  "Affected_versions_regexp" : ["(1\\.[5-9]\\.[0-9])|(2\\.(([0-1]\\.[0-9])|(2\\.[0-9])))"],
  "Affected_manufacturers" : [["all"]],
  "Fixed_versions" : [["2.3"]],
  "references" : {
    "c-skills-adb-trickery" : {
      "url" : "http://c-skills.blogspot.co.uk/2011/01/adb-trickery-again.html",
      "archiveurl" : "https://perma.cc/C52U-CJ6F"
    },
    "ashmem-fix-core" : {
      "url" : "https://android.googlesource.com/platform/system/core/+/25b15be9120bcdaa0aba622c67ad2c835d9e91ca",
      "component" : "platform/system/core",
      "commit" : "25b15be9120bcdaa0aba622c67ad2c835d9e91ca"
    },
    "ashmem-fix-kernel" : {
      "url" : "https://android.googlesource.com/kernel/common/+/c98a285075f26e2b17a5baa2cb3eb6356a75597e",
      "component" : "kernel/common",
      "commit" : "c98a285075f26e2b17a5baa2cb3eb6356a75597e"
    },
    "android-release-2.3" : {
      "url" : "http://android-developers.blogspot.com/2010/12/android-23-platform-and-updated-sdk.html",
      "archiveurl" : "https://perma.cc/5GEF-ZYXY"
    }
  },
  "Surface": ["local", "app"],
  "Vector": ["shared-memory"],
  "Target": ["system-component"],
  "Channel": ["app-execution"],
  "Condition": ["affected-app-installed"],
  "Privilege": ["root"]
}
