timwr / CVE-2016-5195

CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android
959 stars 395 forks source link

No matter what kind of argument I give to run-as it just wont execute as root #36

Closed oranaise2412 closed 7 years ago

oranaise2412 commented 7 years ago

So after compiling dirtycow and running it on an Galaxy J5 on 5.1.1 Lollipop (SEAndroid Enforced) http://imgur.com/a/9PRAl , it wont do anything rather it would tell me that it is running as uid 200 and uid 0, thats all. I searched a lot about this issue but was not able to get any detailed information about this issue. My first thought on why its not working was about SEAndroid being enforced, after asking JCase on Twitter, he said that the issue cant be SEAndroid. As to dirtycow itself, it seems to exploit succesfully since run-as binary in /system/bin has changed. I have to mention that my main goal is to spawn a root shell, but yet I cant even run a single command as root. Really appreciate dirtyclow, glad if someone can help me out

timwr commented 7 years ago

Try pull the latest master. It will spawn a root shell, but it will not disable SELinux.