一、 漏洞 CVE-2023-46139 基础信息
漏洞标题
KernelSU 签名验证不匹配漏洞
来源:AIGC 神龙大模型
漏洞描述信息
N/A
来源:AIGC 神龙大模型
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:AIGC 神龙大模型
漏洞类别
密码学签名的验证不恰当
来源:AIGC 神龙大模型
漏洞标题
KernelSU signature validation mismatch
来源:美国国家漏洞数据库 NVD
漏洞描述信息
KernelSU is a Kernel based root solution for Android. Starting in version 0.6.1 and prior to version 0.7.0, if a KernelSU installed device is infected with a malware whose app signing block specially constructed, it can take over root privileges on the device. The vulnerable verification logic actually obtains the signature of the last block with an id of `0x7109871a`, while the verification logic during Android installation is to obtain the first one. In addition to the actual signature upgrade that has been fixed (KSU thought it was V2 but was actually V3), there is also the problem of actual signature downgrading (KSU thought it was V2 but was actually V1). Find a condition in the signature verification logic that will cause the signature not to be found error, and KernelSU does not implement the same conditions, so KSU thinks there is a V2 signature, but the APK signature verification actually uses the V1 signature. This issue is fixed in version 0.7.0. As workarounds, keep the KernelSU manager installed and avoid installing unknown apps.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
来源:美国国家漏洞数据库 NVD
漏洞类别
授权机制不正确
来源:美国国家漏洞数据库 NVD
漏洞标题
KernelSU 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
kernelsu是一种基于内核的Android设备获取root权限的方案。 KernelSU 0.6.1至0.7.0之前版本存在安全漏洞,该漏洞源于允许攻击者通过构建应用程序signing block利用恶意软件接管设备上的root权限。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2023-46139 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2023-46139 的情报信息