Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0443 PoC — Google Android 代码问题漏洞

Source
Associated Vulnerability
Title:Google Android 代码问题漏洞 (CVE-2020-0443)
Description:Google Android是美国谷歌(Google)和开放手持设备联盟(简称OHA)的一套以Linux为基础的开源操作系统。 Google Android/Pixel存在代码问题漏洞,攻击者借助该漏洞可导致本地拒绝服务。
Description
Proof of concept app for Android permanent denial-of-service vulnerability CVE-2020-0443
Readme
# CVE-2020-0443

This is a proof of concept app that exploits [CVE-2020-0443](https://www.cve.org/CVERecord?id=CVE-2020-0443) to brick any Android device. After running the app and rebooting, the device will keep repeating the boot animation.  
[A patch](https://android.googlesource.com/platform/frameworks/base/+/d3a2b5832f6ca9da74cda814ec76aec679b3389a) for this vulnerability was released in the [November 2020 Android security bulletin](https://source.android.com/security/bulletin/2020-11-01#framework).  
Devices bricked due to this vulnerability can be fixed either through factory reset, or if you have access to ADB during the boot-loop:
```
adb shell settings put system system_locales en_US
```
Install and/or run this app at your own risk. I'm not responsible for data loss or damaged devices.  
Note that this project is provided for educational purposes only; please don't use it for malicious activities.
File Snapshot

[4.0K] /data/pocs/6825e8ba723d5ede09666eba402c0bbe98383e05 ├── [4.0K] app │   ├── [1.2K] build.gradle │   ├── [ 772] proguard-rules.pro │   └── [4.0K] src │   ├── [4.0K] androidTest │   │   └── [4.0K] java │   │   └── [4.0K] poc │   │   └── [4.0K] sithija │   │   └── [4.0K] cve_2020_0443 │   │   └── [ 760] ExampleInstrumentedTest.java │   ├── [4.0K] main │   │   ├── [ 879] AndroidManifest.xml │   │   ├── [4.0K] java │   │   │   └── [4.0K] poc │   │   │   └── [4.0K] sithija │   │   │   └── [4.0K] cve_2020_0443 │   │   │   └── [1.0K] MainActivity.java │   │   └── [4.0K] res │   │   ├── [4.0K] drawable │   │   │   └── [5.6K] ic_launcher_background.xml │   │   ├── [4.0K] layout │   │   │   └── [ 974] activity_main.xml │   │   ├── [4.0K] mipmap-hdpi │   │   │   ├── [2.9K] ic_launcher.png │   │   │   └── [4.8K] ic_launcher_round.png │   │   ├── [4.0K] mipmap-mdpi │   │   │   ├── [2.0K] ic_launcher.png │   │   │   └── [2.7K] ic_launcher_round.png │   │   ├── [4.0K] mipmap-xhdpi │   │   │   ├── [4.4K] ic_launcher.png │   │   │   └── [6.7K] ic_launcher_round.png │   │   ├── [4.0K] mipmap-xxhdpi │   │   │   ├── [6.2K] ic_launcher.png │   │   │   └── [ 10K] ic_launcher_round.png │   │   ├── [4.0K] mipmap-xxxhdpi │   │   │   ├── [8.9K] ic_launcher.png │   │   │   └── [ 15K] ic_launcher_round.png │   │   └── [4.0K] values │   │   ├── [ 214] colors.xml │   │   ├── [ 83] strings.xml │   │   └── [ 394] styles.xml │   └── [4.0K] test │   └── [4.0K] java │   └── [4.0K] poc │   └── [4.0K] sithija │   └── [4.0K] cve_2020_0443 │   └── [ 402] ExampleUnitTest.java ├── [ 573] build.gradle ├── [4.0K] gradle │   └── [4.0K] wrapper │   ├── [ 53K] gradle-wrapper.jar │   └── [ 200] gradle-wrapper.properties ├── [ 743] gradle.properties ├── [5.2K] gradlew ├── [2.2K] gradlew.bat ├── [ 34K] LICENSE ├── [ 921] README.md └── [ 16] settings.gradle 28 directories, 30 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.