![]() ![]() ![]() The exploit forks processes until it fails due to the exhaustion of process identifiers. The adb daemon did not check for the return value of the setuid system call when dropping privileges. Up to Android 2.2, Android was vulnerable to the RageAgainstTheCage exploit.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |