Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-13208 PoC — Android 安全漏洞

Source
Associated Vulnerability
Title:Android 安全漏洞 (CVE-2017-13208)
Description:In receive_packet of libnetutils/packet.c, there is a possible out-of-bounds write due to a missing bounds check on the DHCP response. This could lead to remote code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67474440.
Readme
# CVE-2017-13208-Scanner
https://nvd.nist.gov/vuln/detail/CVE-2017-13208
## Introduction
This is a simple script capable of detecting the CVE-2017-13208 vulnerability in Android libnetutils.so files.
## How it works
Using r2pipe, the script checks whether dhcp_size's value is checked, if it isn't - the file is vulnerable.
All of the different libnetutils.so files that were researched compared a fixed number with dhcp_size's value.
Therefore, the script checks for the existence of one of those fixed numbers - 1268, 1260 (0x4ec, 0x4f4), which indicates that
the file isn't vulnerable.
## Usage
./Script.py <file_path>
File Snapshot

[4.0K] /data/pocs/ecce9875aa25953df6270cc836bdb9b54975b487 ├── [ 622] README.md └── [2.1K] Script.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →