Amazon Kindle Touch 5.1.0 Lab126 com.lab126.system Shell Metacharacter code injection
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
8.8 | $0-$5k | 0.00 |
A vulnerability was found in Amazon Kindle Touch 5.1.0 (Tablet Operating System). It has been classified as critical. This affects the function com.lab126.system
of the component Lab126. The manipulation as part of a Shell Metacharacter leads to a code injection vulnerability. CWE is classifying the issue as CWE-94. The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
The Amazon Lab126 com.lab126.system sendEvent implementation on the Kindle Touch before 5.1.2 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a string, as demonstrated by using lipc-set-prop to set an LIPC property, a different vulnerability than CVE-2012-4248.
The weakness was disclosed 04/14/2012 by eureka as Scriptable browser plugin included in 5.1.0 as not defined posting (Website). It is possible to read the advisory at mobileread.com. The vendor was not involved in the public release. This vulnerability is uniquely identified as CVE-2012-4249 since 08/12/2012. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details and a public exploit are known. The attack technique deployed by this issue is T1059 according to MITRE ATT&CK.
A public exploit has been developed by eureka in C and been published 5 days after the advisory. The exploit is shared for download at mobileread.com. It is declared as proof-of-concept.
Upgrading to version 5.1.2 eliminates this vulnerability. The problem might be mitigated by replacing the product with Apple iPad as an alternative. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published 4 months after the disclosure of the vulnerability. 5.1.2 must be applied over 5.1.0 or 5.1.1. Amongst other changes, 5.1.2 deletes NPAPI plugin /usr/lib/libkindleplugin.so, symlink /usrl/lib/browser/plugins/libkindleplugin.so and directory /usr/lib/browser, thus eliminating possible remote attack vector.
The vulnerability is also documented in the vulnerability database at OSVDB (84902†). Further details are available at kb.cert.org. The entry VDB-61543 is pretty similar. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 8.8
VulDB Base Score: 9.8
VulDB Temp Score: 8.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Code injectionCWE: CWE-94 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: eureka
Programming Language: 🔍
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Exploit Delay Time: 🔍
Upgrade: Kindle Touch 5.1.2
Alternative: Apple iPad
Timeline
04/14/2012 🔍04/18/2012 🔍
07/23/2012 🔍
08/12/2012 🔍
08/12/2012 🔍
08/18/2012 🔍
08/30/2012 🔍
08/11/2024 🔍
Sources
Advisory: Scriptable browser plugin included in 5.1.0Researcher: eureka
Status: Not defined
Confirmation: 🔍
CVE: CVE-2012-4249 (🔍)
CERT: 🔍
OSVDB: 84902
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
See also: 🔍
Entry
Created: 08/30/2012 11:06 AMUpdated: 08/11/2024 04:56 PM
Changes: 08/30/2012 11:06 AM (68), 04/29/2018 10:31 AM (6), 08/11/2024 04:56 PM (17)
Complete: 🔍
Cache ID: 18:768:40
No comments yet. Languages: en.
Please log in to comment.