Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc# CVE-2014-4322_poc
poc code works on Nexus Android 4.4/5.0
Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc
author: retme (retme7@gmail.com)
@returnsme on twitter & @retme on weibo
website: retme.net
The exploit must be excuted as system privilege and several specific SELinux context.
If exploit successed,you will gain root privilege and "kernel" SELinux context
# bug info
https://www.codeaurora.org/projects/security-advisories/memory-corruption-qseecom-driver-cve-2014-4322
#how to build
ndk-build
#usage
* Kitkat:
run exploit as system privilege
* Lolipop:
run exploit as system privilege,with SELinux context such as "keystore","vold","drmserver","mediaserver","surfaceflinger"
If exploit successed,you will gain root privilege and "kernel" SELinux context
[4.0K] /data/pocs/fd7f5bce49f5f5aae838b4af271daf2b5e76323e
├── [4.0K] jni
│ ├── [ 280] Android.mk
│ ├── [ 61] Application.mk
│ ├── [ 14K] msm.c
│ ├── [6.2K] qseecom.h
│ └── [ 238] shellcode.S
├── [ 11K] kernel.h
├── [4.0K] libs
│ └── [4.0K] armeabi
│ └── [ 13K] msdd
├── [4.0K] obj
│ └── [4.0K] local
│ └── [4.0K] armeabi
│ ├── [ 48K] msdd
│ └── [4.0K] objs
│ └── [4.0K] msdd
│ ├── [ 22K] msm.o
│ ├── [ 29K] msm.o.d
│ ├── [1.4K] shellcode.o
│ └── [ 563] shellcode.o.d
└── [ 835] README.md
8 directories, 13 files