Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2016-8462 PoC — Android bootloader 信息泄露漏洞

Source
Associated Vulnerability
Title:Android bootloader 信息泄露漏洞 (CVE-2016-8462)
Description:An information disclosure vulnerability in the bootloader could enable a local attacker to access data outside of its permission level. This issue is rated as High because it could be used to access sensitive data. Product: Android. Versions: N/A. Android ID: A-32510383.
Description
Pixel bootlaoder exploit for reading flash storage
Readme
PixelDump - CVE-2016-8462
=========================

PixelDump (CVE-2016-8462) was one of <redacted number> Pixel bootloader vulnerabilities found/worked out by [beaups](https://twitter.com/firewaterdevs) and [Jon 'jcase' Sawyer](https://twitter.com/jcase).


Disclaimer
----------
This is a dirty POC that was never intended to be released, I just copied another project, spent a few minutes adding a few lines, and sent it to Google to boost our bounty reward amount. Lame yes. Working(ish) yes.

Let me repeat, this is AWFUL code. Do not actually assume you can use this for anything.

Details
-------
This vulnerability allows you to effectively 'read' data off the device while in bootloader mode, even with a locked bootloader.

While many people found the vulnerability, we found it first and managed to collect $4000 for it from Google, which we donated to the Clallam County Special Olympics.
Vulnerability was also found by the [Roee Hay](https://twitter.com/roeehay) at IBM, he has a write up at https://securityresear.ch/2017/01/04/fastboot-oem-sha1sum/ if you want details. He describes it quite well.


File Snapshot

[4.0K] /data/pocs/bf2a5a44d393bcb7a28c75db1ede434be4a3ea42 ├── [ 34K] LICENSE ├── [1.1K] README.md └── [4.0K] src ├── [4.0K] com │   └── [4.0K] streamlinedmobile │   └── [4.0K] pixeldump │   └── [9.5K] Main.java └── [4.0K] META-INF └── [ 75] MANIFEST.MF 5 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →