CVE-2013-2596

Known Exploited Public Exploit

Description

Integer overflow in the fb_mmap function in drivers/video/fbmem.c in the Linux kernel before 3.8.9, as used in a certain Motorola build of Android 4.1.2 and other products, allows local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system calls, as demonstrated by the Motochopper pwn program.

Category

7.8
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.80% Top 30%
KEV Since 
Vendor Advisory redhat.com Vendor Advisory mandriva.com Vendor Advisory redhat.com Vendor Advisory redhat.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://rhn.redhat.com/errata/RHSA-2015-0695.html third party advisory vendor advisory
http://www.securityfocus.com/bid/59264 vdb entry third party advisory broken link
http://www.droid-life.com/2013/04/09/root-method-released-for-droid-razr-hd-running-android-4-1-2-other-devices-too/ issue tracking exploit third party advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2013:176 vendor advisory broken link
http://marc.info/?l=linux-kernel&m=136616837923938&w=2 mailing list third party advisory patch
https://github.com/torvalds/linux/commit/b4cbb197c7e7a68dbad0d491242e3ca67420c13e patch
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html third party advisory patch
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4cbb197c7e7a68dbad0d491242e3ca67420c13e broken link
http://rhn.redhat.com/errata/RHSA-2015-0803.html third party advisory vendor advisory
http://forum.xda-developers.com/showthread.php?t=2255491 exploit
http://www.droidrzr.com/index.php/topic/15208-root-motochopper-yet-another-android-root-exploit/ issue tracking exploit
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.9 mailing list release notes
http://rhn.redhat.com/errata/RHSA-2015-0782.html third party advisory vendor advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761 third party advisory
https://github.com/torvalds/linux/commit/fc9bbca8f650e5f738af8806317c0a041a48ae4a patch exploit
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fc9bbca8f650e5f738af8806317c0a041a48ae4a broken link

Frequently Asked Questions

What is the severity of CVE-2013-2596?
CVE-2013-2596 has been scored as a high severity vulnerability.
How to fix CVE-2013-2596?
To fix CVE-2013-2596, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2013-2596 being actively exploited in the wild?
It is confirmed that CVE-2013-2596 is actively exploited. Be extra cautious if you are using vulnerable components. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.