Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-8467 PoC — Google Nexus Mediaserver 安全漏洞

Source
Associated Vulnerability
Title:Google Nexus Mediaserver 安全漏洞 (CVE-2016-8467)
Description:Google Nexus 6P和Nexus 6都是美国谷歌(Google)公司的智能手机。bootloader是其中的一个启动加载程序。 Google Nexus 6P和Nexus 6设备上的bootloader中存在拒绝服务漏洞。攻击者可利用该漏洞造成拒绝服务。
Description
This app checks if you're vulnerable to CVE-2016-8467 and/or if your bootmode property has been tampered with.
Readme
# bootmodechecker
This app checks if your Nexus 6/6P is still vulnerable to [CVE-2016-8467](https://securityresear.ch/2017/01/05/attacking-android-custom-bootmodes/) and/or if your bootmode property has been tampered with.

Also available under Google Play: https://play.google.com/store/apps/details?id=roeeh.bootmodechecker

![tampered](n6p-bootmode-tampered.png)
File Snapshot

[4.0K] /data/pocs/a4a55d638d0e2c91e844873b4db2a04cc64c2bd5 ├── [4.0K] app │   ├── [ 870] build.gradle │   ├── [ 659] proguard-rules.pro │   └── [4.0K] src │   └── [4.0K] main │   ├── [ 664] AndroidManifest.xml │   ├── [336K] ic_launcher-web.png │   ├── [4.0K] java │   │   └── [4.0K] roeeh │   │   └── [4.0K] bootmodechecker │   │   └── [5.8K] BootmodeActivity.java │   └── [4.0K] res │   ├── [4.0K] layout │   │   └── [5.3K] activity_main.xml │   ├── [4.0K] mipmap-hdpi │   │   └── [9.8K] ic_launcher.png │   ├── [4.0K] mipmap-mdpi │   │   └── [4.7K] ic_launcher.png │   ├── [4.0K] mipmap-xhdpi │   │   └── [ 17K] ic_launcher.png │   ├── [4.0K] mipmap-xxhdpi │   │   └── [ 35K] ic_launcher.png │   ├── [4.0K] mipmap-xxxhdpi │   │   └── [ 58K] ic_launcher.png │   ├── [4.0K] values │   │   ├── [ 208] colors.xml │   │   ├── [ 211] dimens.xml │   │   ├── [ 78] strings.xml │   │   └── [ 383] styles.xml │   └── [4.0K] values-w820dp │   └── [ 358] dimens.xml ├── [ 498] build.gradle ├── [4.9K] gradlew ├── [2.3K] gradlew.bat ├── [306K] icon.png ├── [ 11K] LICENSE ├── [ 11K] n6p-bootmode-tampered.png ├── [ 366] README.md └── [ 15] settings.gradle 15 directories, 24 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.