Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-1805 PoC — Linux kernel‘fs/pipe.c’本地内存损坏漏洞

Source
Associated Vulnerability
Title:Linux kernel‘fs/pipe.c’本地内存损坏漏洞 (CVE-2015-1805)
Description:Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。NFSv4 implementation是其中的一个分布式文件系统协议。 Linux kernel 3.16之前版本的fs/pipe.c文件中的pipe_read和pipe_write实现过程中存在安全漏洞,该漏洞源于程序没有正确考虑failed __copy_to_user_inatomic和__copy_from_user_inatomic调用的副效应。本地攻击者可借助特制的应用程序利用该漏洞造成拒绝服务(系统崩溃
Description
AndroRAT is a capability that can be used to inject a root exploit as a silent installation to perform a malicious task on the device. This AndroRAT is designed to exploit CVE-2015-1805, a vulnerability that was discovered and made public in 2016.
Readme
# Android-Privilege-Escalation-Remote-Access-Vulnerability-CVE-2015-1805
inject a root exploit as a silent installation to perform a malicious task on the device. 

# Vulnerability

AndroRAT does not focus on targeting a specific
user but rather works to acquire the confidence of the entire network. Exploits are
used to facilitate the movement of data around a network and the uploading of
data from any device that is reachable. It is utilized for the purpose of remotely
managing an Android phone.

# Vulnerability Description

AndroRAT is a capability that can be used to inject a root exploit as a silent
installation to perform a malicious task on the device. This AndroRAT is
designed to exploit CVE-2015-1805, a vulnerability that was discovered and
made public in 2016, and which enables malicious actors to compromise a variety
of older Android devices in order to escalate their privileges.
File Snapshot

[4.0K] /data/pocs/2c2f767c8b1f47a99a23fea054f2dda548cda2ab ├── [2.4K] androRaT.py └── [ 903] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.