支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: f1fed4ddb059a84c9f69f3599d38a7510d037b3a

来源
关联漏洞
标题:NVIDIA Tegra移动处理器BootROM Recovery Mode 缓冲区错误漏洞 (CVE-2018-6242)
描述:NVIDIA Tegra mobile processors是美国英伟达(NVIDIA)公司的一款中央处理器产品。BootROM Recovery Mode(RCM)是其中的一个能够对数据进行修改的工程模式组件。 NVIDIA Tegra移动处理器2016之前版本中的RCM存在缓冲区溢出漏洞。攻击者可利用该漏洞执行未验证的代码。
描述
Rust implementation of the Fusée Gelée exploit (CVE-2018-6242) for Tegra processors.
介绍
# fusee-gelee
*Rust implementation of the [Fusée Gelée](https://github.com/Qyriad/fusee-launcher) exploit (CVE-2018-6242) for Tegra processors.*

Currently supported platforms:
- Linux via `libusb`.

## Instructions
1. Obtain executable version of the exploit launcher.
2. Obtain a payload suitable for use on the target device.
3. Execute the launcher, providing a path to the payload:
```sh
./fusee-gelee /path/to/fusee-primary.bin
```

## Building from source
Create a debug build:
```sh
git clone https://github.com/austinhartzheim/fusee-gelee.git
cd fusee-gelee
cargo build  # binary output to target/debug/fusee-gelee
```

Create a release build:
```sh
cargo build --release
```

## Developing
Unit tests are available to compare the payload generation output against a sample payload generated by the Python implementation. To run the tests:
```sh
cargo test
```

## License
Licensed under the terms of GPL version 2. See `LICENSE.txt` for details.
文件快照

[4.0K] /data/pocs/f1fed4ddb059a84c9f69f3599d38a7510d037b3a ├── [ 206] Cargo.toml ├── [ 18K] LICENSE.txt ├── [ 957] README.md └── [4.0K] src ├── [4.0K] bin │   └── [1.6K] fusee-gelee.rs ├── [ 328] constants.rs ├── [4.0K] data │   ├── [ 92K] fusee-primary.bin │   ├── [ 124] intermezzo.bin │   ├── [108K] original-payload.bin │   └── [ 382] README.md ├── [6.0K] exploit.rs ├── [4.1K] lib.rs └── [3.1K] payload.rs 3 directories, 12 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。