Source : Android Police
- On ClockWorkMod Superuser, /system/xbin/su does not set PATH to a known-good value, so a malicious user could trick /system/bin/am into using a trojaned app_process binary
- Other environment variables could be used to affect the behavior of the (moderately complex) subprocesses. For instance, manipulation of BOOTCLASSPATH could cause a malicious .jar file to be loaded into the privileged Dalvik VM instance. All three Superuser implementations allowed Dalvik's BOOTCLASSPATH to be supplied by the attacker. (this one affected all three packages)
Related Posts
AndroidPIT app v. 2.1 released: new design, great functions & more
07 Feb 20140AndroidPIT Our app’s interface has been refined and optimized with version 2.1, which you c...[...]
Firefox Launcher for Android
07 Feb 20140The Firefox Launcher offers you recommendations and smart searches will recommend apps you already...[...]
Microsoft Office for iPad review
28 Mar 20140Microsoft Office for iPad When Apple announced that its iWork suite would be bundled, free of ch...[...]
Xbox One's first major update split in two, launching in February and March
07 Feb 20140Xbox One's When the first component of Xbox One's spring update arrives on February 11t...[...]
iOS : Google Maps Will Alert You to Faster Routes
05 Feb 20140Google Maps We can pretty much all agree that being stuck in traffic sucks, right? Well, we have...[...]
Top 5 Android Apps for Outdoor Adventures
27 Dec 20130Accelerometers, GPS receivers and other sensors in your smartphone let you track your outdoor act...[...]
What’s the best Android phone of 2013?
27 Dec 20130After a few long, hard days of voting at the polls, you guys weighed in on the top Android pho...[...]
Guide : An iOS field guide for Android converts
26 Dec 20130iOS field guide for Android Android and iOS differ in one critical way: the level of control y...[...]
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.