timwr / CVE-2016-5195

CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android
950 stars 392 forks source link

Exploit just does nothing on zenphone 2 laser #107

Open J0SH1X opened 2 months ago

J0SH1X commented 2 months ago

tmp/dirtycow /data/local/tmp/run-as /system/bin/run-as < WARNING: linker: /data/local/tmp/dirtycow: unsupported flags DT_FLAGS_1=0x8000001 dcow /data/local/tmp/run-as /system/bin/run-as warning: source file size (14112) and destination file size (14192) differ will append 80 zero bytes to source

[] size 14192 [] mmap 0x7fb0210000 [] currently 0x7fb0210000=10102464c457f [] using /proc/self/mem method [] check thread starts, address 0x7fb0210000, size 14192 [] madvise thread starts, address 0x7fb0210000, size 14192

J0SH1X commented 2 months ago

Android 6.0.1 December 1st 2016

Kernel 3.10.49

timwr commented 2 months ago

I assume this was patched in December 2016. Can you try: make test

J0SH1X commented 2 months ago

I already got the phone unlocked and rooted, as far as i know it was patched in 5th Dezember 2016 the phone was on 1st december