关联漏洞
描述
PoC for old Binder vulnerability (based on P0 exploit)
介绍
# CVE-2019-2215
PoC for old Binder vulnerability (based on P0 exploit)
# Description
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application
# Reference
- https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html
- https://cloudfuzz.github.io/android-kernel-exploitation/
# Note
This is only a PoC and no shell is spawned. It's only purpose is for learning kernel exploitation. Indeed, the expected result is to have a modified `addr_limit` in task_struct.
文件快照
[4.0K] /data/pocs/5ddcdf11d9688f92c0745a7f2ae89b715044cb52
├── [ 34K] LICENSE
├── [ 737] Makefile
├── [6.6K] PoC.cpp
└── [ 750] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。