Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-8462 PoC — Android bootloader 信息泄露漏洞

Source
Associated Vulnerability
Title:Android bootloader 信息泄露漏洞 (CVE-2016-8462)
Description:Android on Google Pixel XL和Pixel是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套运行于Google Pixel XL和Pixel(智能手机)中并以Linux为基础的开源操作系统。bootloader是其中的一个启动加载程序。 Google Pixel XL和Pixel设备上的Android中的bootloader存在信息泄露漏洞。攻击者可利用该漏洞访问未授权的数据。
Description
Pixel bootlaoder exploit for reading flash storage
Readme
PixelDump - CVE-2016-8462
=========================

PixelDump (CVE-2016-8462) was one of <redacted number> Pixel bootloader vulnerabilities found/worked out by [beaups](https://twitter.com/firewaterdevs) and [Jon 'jcase' Sawyer](https://twitter.com/jcase).


Disclaimer
----------
This is a dirty POC that was never intended to be released, I just copied another project, spent a few minutes adding a few lines, and sent it to Google to boost our bounty reward amount. Lame yes. Working(ish) yes.

Let me repeat, this is AWFUL code. Do not actually assume you can use this for anything.

Details
-------
This vulnerability allows you to effectively 'read' data off the device while in bootloader mode, even with a locked bootloader.

While many people found the vulnerability, we found it first and managed to collect $4000 for it from Google, which we donated to the Clallam County Special Olympics.
Vulnerability was also found by the [Roee Hay](https://twitter.com/roeehay) at IBM, he has a write up at https://securityresear.ch/2017/01/04/fastboot-oem-sha1sum/ if you want details. He describes it quite well.


File Snapshot

[4.0K] /data/pocs/bf2a5a44d393bcb7a28c75db1ede434be4a3ea42 ├── [ 34K] LICENSE ├── [1.1K] README.md └── [4.0K] src ├── [4.0K] com │   └── [4.0K] streamlinedmobile │   └── [4.0K] pixeldump │   └── [9.5K] Main.java └── [4.0K] META-INF └── [ 75] MANIFEST.MF 5 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.