Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-9411 PoC — Android Media framework 安全漏洞

Source
Associated Vulnerability
Title:Android Media framework 安全漏洞 (CVE-2018-9411)
Description:Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。Media framework是其中的一个用于多媒体开发的框架。 Android 8.0版本和8.1版本中的Media framework存在远程代码执行漏洞。远程攻击者可利用该漏洞执行任意代码。
Description
Exploit code for CVE-2018-9411 for MediaCasService
Readme
# CVE-2018-9411

Exploit code for CVE-2018-9411 for MediaCasService.

Note that this exploit is only provided for educational or defensive purposes; it is not intended for any malicious or offensive use.

Full write-up for the vulnerability and the exploit is available [on the Zimperium blog](https://blog.zimperium.com/cve-2018-9411-new-critical-vulnerability-multiple-high-privileged-android-services).

If you have any questions, you are welcome to DM me on Twitter ([@tamir_zb](https://twitter.com/tamir_zb)).

## Build

**Note: this exploit is only intended to work on a specific device and build - Pixel 2 with the May 2018 security update** (fingerprint: `google/walleye/walleye:8.1.0/OPM2.171019.029.B1/4720900:user/release-keys`).

In order to build this:

1. [Download the Android source code](https://source.android.com/setup/build/downloading).
2. Put this repository in `AOSP/external`.
3. Run the following commands:

```
cd AOSP
source build/envsetup.sh
make cas_exploit
```

## Result

A successful run of this exploit should obtain access to the TEE device, which will be demonstrated by getting the QSEOS version.

Example exploit output:

```
[+] Prepared descrambler object
[+] Determined small heap address (address = 0xec9d8000)
[+] Prepared remote threads
[+] Found target thread (stack address = 0xeb42b000, libc address = 0xec51d000)
[+] Copied data for ROP chain
[+] ROP stack written
[+] Running ROP chain...
[+] QSEOS version = 0x14
```
File Snapshot

[4.0K] /data/pocs/727170feef219da4205dbcb8220452c4bdaeb152 ├── [ 351] Android.mk ├── [ 13K] cas_exploit.cpp ├── [1.2K] defs.h ├── [ 34K] LICENSE ├── [1.3K] offsets.h ├── [ 11K] qseecom.h └── [1.4K] README.md 0 directories, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.