POC详情: bf2a5a44d393bcb7a28c75db1ede434be4a3ea42

来源
关联漏洞
标题: Android bootloader 信息泄露漏洞 (CVE-2016-8462)
描述:Android on Google Pixel XL和Pixel是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套运行于Google Pixel XL和Pixel(智能手机)中并以Linux为基础的开源操作系统。bootloader是其中的一个启动加载程序。 Google Pixel XL和Pixel设备上的Android中的bootloader存在信息泄露漏洞。攻击者可利用该漏洞访问未授权的数据。
描述
Pixel bootlaoder exploit for reading flash storage
介绍
PixelDump - CVE-2016-8462
=========================

PixelDump (CVE-2016-8462) was one of <redacted number> Pixel bootloader vulnerabilities found/worked out by [beaups](https://twitter.com/firewaterdevs) and [Jon 'jcase' Sawyer](https://twitter.com/jcase).


Disclaimer
----------
This is a dirty POC that was never intended to be released, I just copied another project, spent a few minutes adding a few lines, and sent it to Google to boost our bounty reward amount. Lame yes. Working(ish) yes.

Let me repeat, this is AWFUL code. Do not actually assume you can use this for anything.

Details
-------
This vulnerability allows you to effectively 'read' data off the device while in bootloader mode, even with a locked bootloader.

While many people found the vulnerability, we found it first and managed to collect $4000 for it from Google, which we donated to the Clallam County Special Olympics.
Vulnerability was also found by the [Roee Hay](https://twitter.com/roeehay) at IBM, he has a write up at https://securityresear.ch/2017/01/04/fastboot-oem-sha1sum/ if you want details. He describes it quite well.


文件快照

[4.0K] /data/pocs/bf2a5a44d393bcb7a28c75db1ede434be4a3ea42 ├── [ 34K] LICENSE ├── [1.1K] README.md └── [4.0K] src ├── [4.0K] com │   └── [4.0K] streamlinedmobile │   └── [4.0K] pixeldump │   └── [9.5K] Main.java └── [4.0K] META-INF └── [ 75] MANIFEST.MF 5 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。