Exploit:Android/GingerBreak is a piece of code that exploits a vulnerability (CVE-2011-1823) in Android operating systems before version 2.3.4 to gain root privileges on the affected device.
When detected during scanning, F-Secure SAFE will prompt you for a desired action. You may assess the detected file and choose to Uninstall, Quarantine or keep it installed on your device. More information about these options can be found at Help Center: Assess files detected during scanning.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Exploit:Android/GingerBreak is a rooting exploit that can be used on Android 2.3.3 (Gingerbread) devices to escalate privileges on the system. Based on the author's own description of the exploit and examination of its binary, it may also work on Android 2.2 (Froyo) and 3.0 (Honeycomb) devices. This exploit may be willingly used by the device's own user to gain root privileges on the device; or silently used by an attacker to gain unauthorized access to the device.
GingerBreak is known to have first been used in Trojan:Android/GinMaster (also known as GingerMaster).
The vulnerability targeted by the GingerBreak exploit was patched in the 2.3.4 update for the Android operating system.
The vulnerability leveraged by the exploit is application or platform specific; in other words, a specific program (or even a specific version of a particular program) must be installed in order for the exploit to be effective.
To prevent exploitation of such vulnerabilities, please refer to the application or device vendor for the latest updates and additional advice.