# N/A
## 漏洞概述
一个存在于 `binder.c` 中的 use-after-free 漏洞允许从应用程序提升权限至 Linux 内核。无需用户交互即可利用此漏洞,但利用需要安装恶意本地应用程序或存在一个面向网络的应用程序中的单独漏洞。
## 影响版本
产品: Android
Android ID: A-141720095
## 细节
该漏洞是一个 use-after-free 类型的漏洞,位于 `binder.c` 文件中。此漏洞可导致权限提升,从应用程序权限升高到 Linux 内核权限。利用该漏洞不需要用户交互,但需要通过安装一个恶意应用程序或利用其他面向网络的应用程序漏洞来进行触发。
## 影响
该漏洞可能导致权限提升,使恶意应用程序或程序获得内核级别的权限,从而可能被用于恶意操作或破坏系统的安全性。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | None | https://github.com/timwr/CVE-2019-2215 | POC详情 |
2 | None | https://github.com/raystyle/CVE-2019-2215 | POC详情 |
3 | Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215 | https://github.com/kangtastic/cve-2019-2215 | POC详情 |
4 | CVE 2019-2215 Android Binder Use After Free | https://github.com/marcinguy/CVE-2019-2215 | POC详情 |
5 | Temproot for Bravia TV via CVE-2019-2215. | https://github.com/LIznzn/CVE-2019-2215 | POC详情 |
6 | Android privilege escalation via an use-after-free in binder.c | https://github.com/DimitriFourny/cve-2019-2215 | POC详情 |
7 | android-kernel-exploitation-ashfaq-CVE-2019-2215 docker setup for mac users | https://github.com/qre0ct/android-kernel-exploitation-ashfaq-CVE-2019-2215 | POC详情 |
8 | Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215 | https://github.com/sharif-dev/AndroidKernelVulnerability | POC详情 |
9 | PoC for old Binder vulnerability (based on P0 exploit) | https://github.com/c3r34lk1ll3r/CVE-2019-2215 | POC详情 |
10 | Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215 | https://github.com/Byte-Master-101/CVE-2019-2215 | POC详情 |
11 | CVE-2019-2215 | https://github.com/mufidmb38/CVE-2019-2215 | POC详情 |
12 | Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration | https://github.com/nicchongwb/Rootsmart-v2.0 | POC详情 |
13 | for kernel 3.18.x | https://github.com/enceka/cve-2019-2215-3.18 | POC详情 |
14 | Exploit for Bad Binder | https://github.com/elbiazo/CVE-2019-2215 | POC详情 |
15 | Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC | https://github.com/jsirichai/CVE-2019-2215 | POC详情 |
16 | Exploit for CVE-2019-2215 (bad binder) for Huawei P20 Lite | https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite | POC详情 |
17 | This is a bad-binder exploit affecting the android binder IPC system that was used in the wild discovered by P0 | https://github.com/mutur4/CVE-2019-2215 | POC详情 |
18 | Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration | https://github.com/CrackerCat/Rootsmart-v2.0 | POC详情 |
19 | CVE 2019-2215 Android Binder Use After Free | https://github.com/ATorNinja/CVE-2019-2215 | POC详情 |
20 | None | https://github.com/raymontag/CVE-2019-2215 | POC详情 |
21 | Unlock your Huawei device with ADB (CVE-2019-2215) | https://github.com/R0rt1z2/huawei-unlock | POC详情 |
22 | Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC | https://github.com/stevejubx/CVE-2019-2215 | POC详情 |
23 | Andriod binder bug record | https://github.com/XiaozaYa/CVE-2019-2215 | POC详情 |
24 | CVE-2019-2215 poc for Huawei hardened kernel | https://github.com/llccd/TempRoot-Huawei | POC详情 |
25 | None | https://github.com/0xbinder/android-kernel-exploitation-cve-2019-2215 | POC详情 |
26 | This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder subsystem. | https://github.com/0xbinder/android-kernel-exploitation-lab | POC详情 |
27 | None | https://github.com/mouseos/cve-2019-2215_SH-M08 | POC详情 |
暂无评论