drozer icon indicating copy to clipboard operation
drozer copied to clipboard

Root exploits

Open metall0id opened this issue 12 years ago • 3 comments

Here is a list of all the exploits that I could find to obtain root on Android. We would like to port as many of these as possible into drozer. Please feel free to correct or contribute to this list, but more importantly to help us port them :) A list of all known root exploit is maintained (not by me) @ https://docs.google.com/spreadsheet/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&single=true&gid=0&output=html

Exploit Reference Possible to port to drozer? Comment
Exploid CVE-2009-1185 Yes
Gingerbreak CVE-2011-1823 Yes Requires drozer with READ_LOGS permission
Mempodroid CVE-2012-0056 Yes Needs a SUID binary that writes something deterministic to a file descriptor. But run-as only works as root or shell user, hence on stock Android this will not work from an app
Wunderbar CVE-2009-2692 Yes
ZergRush CVE-2011-3874 Yes Requires drozer with READ_LOGS permission
Zimperlich / Zygote c-skills blog Yes Exploits the zygote setuid() bug
Exynos CVE-2012-6422 Yes Done - testing completed on Galaxy S3 + S2
ZTE sync_agent CVE-2012-2949 Yes Done - still requires testing
cmdclient xdadevelopers / Dan Rosenburg Yes Done - still requires testing
HTC Butterfly diag Yes
Levitator CVE-2011-1352 Unclear Requires access to /dev/pvrsrvkm - what are the permissions on this?
Thinkpad Tablet Dan Rosenburg Unclear Runs thinkpwn binary
Droid 4 (motofail) Dan Rosenburg Unclear Runs motofail binary
XYBoard/Xoom 2 Dan Rosenburg Unclear Runs xyz binary
KillingInTheNameOf CVE-2010-743C No Remap Android property space to writeable which gives root shell from shell user
rageagainstthecage No Exploits the adb setuid() bug
psneuter CVE-2011-1149 No Disables access to the property service and so ADB starts as root (Android assumes ro.secure is off)
Samsung Admire Dan Rosenburg No Requires privileges held by shell user
Droid 3 Dan Rosenburg No Requires privileges held by shell user
LG Spectrum Dan Rosenburg No Requires privileges held by shell user
LG Esteem Dan Rosenburg No Requires privileges held by shell user
Sony Tablet S Dan Rosenburg No Requires privileges held by shell user

metall0id avatar Jan 24 '13 21:01 metall0id

Here is a list of all the exploits that I could find to obtain root on Android. We would like to port as many of these as possible into drozer. Please feel free to correct or contribute to this list, but more importantly to help us port them :) A list of all known root exploit is maintained (not by me) @ https://docs.google.com/spreadsheet/pub?key=0Am5hHW4ATym7dGhFU1A4X2lqbUJtRm1QSWNRc3E0UlE&single=true&gid=0&output=html

Exploit Reference Possible to port to drozer? Comment Exploid CVE-2009-1185 Yes Gingerbreak CVE-2011-1823 Yes Requires drozer with READ_LOGS permission Mempodroid CVE-2012-0056 Yes Needs a SUID binary that writes something deterministic to a file descriptor. But run-as only works as root or shell user, hence on stock Android this will not work from an app Wunderbar CVE-2009-2692 Yes ZergRush CVE-2011-3874 Yes Requires drozer with READ_LOGS permission Zimperlich / Zygote c-skills blog Yes Exploits the zygote setuid() bug Exynos CVE-2012-6422 Yes Done - testing completed on Galaxy S3 + S2 ZTE sync_agent CVE-2012-2949 Yes Done - still requires testing cmdclient xdadevelopers / Dan Rosenburg Yes Done - still requires testing HTC Butterfly diag Yes Levitator CVE-2011-1352 Unclear Requires access to /dev/pvrsrvkm - what are the permissions on this? Thinkpad Tablet Dan Rosenburg Unclear Runs thinkpwn binary Droid 4 (motofail) Dan Rosenburg Unclear Runs motofail binary XYBoard/Xoom 2 Dan Rosenburg Unclear Runs xyz binary KillingInTheNameOf CVE-2010-743C No Remap Android property space to writeable which gives root shell from shell user rageagainstthecage No Exploits the adb setuid() bug psneuter CVE-2011-1149 No Disables access to the property service and so ADB starts as root (Android assumes ro.secure is off) Samsung Admire Dan Rosenburg No Requires privileges held by shell user Droid 3 Dan Rosenburg No Requires privileges held by shell user LG Spectrum Dan Rosenburg No Requires privileges held by shell user LG Esteem Dan Rosenburg No Requires privileges held by shell user Sony Tablet S Dan Rosenburg No Requires privileges held by shell user

https://libsodium.gitbook.io/doc/bindings_for_other_languages

jessicam7 avatar Aug 19 '23 05:08 jessicam7

``[https://libsodium.gitbook.io/doc/bindings_for_other_languages]() 

jessicam7 avatar Aug 19 '23 05:08 jessicam7

Duplicate of #

jessicam7 avatar Aug 19 '23 05:08 jessicam7