Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-13208 PoC — Android 安全漏洞

Source
Associated Vulnerability
Title:Android 安全漏洞 (CVE-2017-13208)
Description:Android是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套以Linux为基础的开源操作系统。 Android中的libnetutils/packet.c文件的receive_packet存在远程代码执行漏洞,该漏洞源于程序没有对DHCP响应执行边界检测。远程攻击者可利用该漏洞执行任意代码。以下版本受到影响:5.1.1版本,6.0版本,6.0.1版本,7.0版本,7.1.1版本,7.1.2版本,8.0版本,8.1版本。
Readme
# CVE-2017-13208-Scanner
https://nvd.nist.gov/vuln/detail/CVE-2017-13208
## Introduction
This is a simple script capable of detecting the CVE-2017-13208 vulnerability in Android libnetutils.so files.
## How it works
Using r2pipe, the script checks whether dhcp_size's value is checked, if it isn't - the file is vulnerable.
All of the different libnetutils.so files that were researched compared a fixed number with dhcp_size's value.
Therefore, the script checks for the existence of one of those fixed numbers - 1268, 1260 (0x4ec, 0x4f4), which indicates that
the file isn't vulnerable.
## Usage
./Script.py <file_path>
File Snapshot

[4.0K] /data/pocs/ecce9875aa25953df6270cc836bdb9b54975b487 ├── [ 622] README.md └── [2.1K] Script.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.