Closed GoogleCodeExporter closed 8 years ago
This is a duplicate:
https://code.google.com/p/android/issues/detail?id=182559
Public now, unrestricting.
http://blog.exodusintel.com/2015/08/13/stagefright-mission-accomplished/
Original comment by natashe...@google.com
on 13 Aug 2015 at 8:43
Might as well unrestrict 182559 then...
Original comment by berendjanwever
on 14 Aug 2015 at 3:43
nice
Original comment by wangwei...@gmail.com
on 26 Aug 2015 at 3:49
[deleted comment]
Updating with a proof-of-concept exploit by Mark Brand. See the Project Zero
blog for more details.
Original comment by haw...@google.com
on 16 Sep 2015 at 6:30
Attachments:
Could you please tell me that where i can get the "shellcode.bin" in the Exp
file mp4_stagefright_release.py?
Original comment by jiangsha...@gmail.com
on 10 Oct 2015 at 9:03
Original comment by natashe...@google.com
on 29 Oct 2015 at 5:33
jiangsha,
You can use any shellcode, either build from scratch or take an existing one.
You can use Zimpirium's remote shell, that was originally taken from Linux
ARMLE 'shell_reverse_tcp' then modified to pass environment and fork + exit:
https://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-no
w-available-for-testing-purposes
Good luck!
Original comment by tsahites...@gmail.com
on 1 Nov 2015 at 8:52
BTW, anyone knows the exact version of Android 5.x that works with Google's
security research exploit? It crashes my LG-G2 (5.0.2) and Samsung S4 (5.0.1).
Original comment by tsahites...@gmail.com
on 1 Nov 2015 at 8:54
Original issue reported on code.google.com by
natashe...@google.com
on 12 Aug 2015 at 6:30Attachments: