7.8
CVSSv3

CVE-2020-0041

Published: 10/03/2020 Updated: 12/07/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 644
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In binder_transaction of binder.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145988638References: Upstream kernel

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android -

Github Repositories

This repository will store potential CVEs for a device as titled above and other related code.

ZTE-Blade-A5-2019-Nae-Nae-List This repository will store potential CVEs for a device as titled above and other related code CVE List: 1#: githubcom/j4nn/CVE-2020-0041 2#: githubcom/HaboobLab/CVE-2019-13764 3# (Currently zero lol): wwwcvedetailscom/vulnerability-list/vendor_id-33/product_id-47/version_id-302471/Linux-Linux-Kernel-44147html 4#: ht

chrome0day

WebAssembly Exploitation Example The following code demonstrates an example of WebAssembly exploitation through JavaScript It leverages vulnerabilities to execute shellcode in the context of the current process // Define WebAssembly module var wasm_code = new Uint8Array([]); // Raw WebAssembly bytecode var wasm_mod = new WebAssemblyModule(wasm_code); var wasm_instance = n

Exploits for Android Binder bug CVE-2020-0041

CVE-2020-0041 This repository contains code for exploiting CVE-2020-0041, a bug we reported to Google in Decmeber 2019 and was fixed in the Android Security Bulletin from March 2020 You can find the sandbox escape exploit in sandbox/ The analysis of the bug and exploitation approach can be found at labsbluefrostsecurityde/blog/2020/03/31/cve-2020-0041-part-1-sandbox

CVE-2020-0041 This repository contains LPE code for exploiting CVE-2020-0041 implemented by bluefrostsecurity as released at githubcom/bluefrostsecurity/CVE-2020-0041/tree/master/lpe The exploitation approach for this part can be found at labsbluefrostsecurityde/blog/2020/04/08/cve-2020-0041-part-2-escalating-to-root/ This forked repository shall host por

CVE-2020-0041 This repository contains LPE code for exploiting CVE-2020-0041 implemented by bluefrostsecurity as released at githubcom/bluefrostsecurity/CVE-2020-0041/tree/master/lpe The exploitation approach for this part can be found at labsbluefrostsecurityde/blog/2020/04/08/cve-2020-0041-part-2-escalating-to-root/ This forked repository shall host por

awesome list of browser exploitation tutorials

awesome-browser-exploit Share some useful archives about browser exploitation I'm just starting to collect what I can found, and I'm only a starter in this area as well Contributions are welcome Chrome v8 Basic v8 github mirror(docs within)[github] on-stack replacement in v8[article] // multiple articles can be found within A tour of V8: Garbage Collection[article

Adapted CVE-2020-0041 root exploit for Pixel 3

Root Exploit for Pixel 3 Family This folder contains a local privilege escalation exploit, a modification of the bluefrostsecurity PoC for CVE-2020-0041 The exploit disables SELinux and then launches a root shell The exploit was provided with hardcoded offsets for a Pixel 3 device running the February 2020 firmware (QQ1A200205002) The exploit can be adapted for any Pixel

Dirty Pipe root exploit for Android (Pixel 6)

DirtyPipe for Android Dirty Pipe (CVE-2022-0847) temporary root PoC for Android Targets Currently only run on Pixel 6 with security patch level from 2022-02-05 to 2022-04-05 Don't use on other devices or other versions It must crash (reboot) Dirty Pipe is finally patched on 2022 May security update on Pixel 6 There is a port to Realme GT2 Pro by @rapperskull (#12) li

awesome-browser-exploit Share some useful archives about browser exploitation I'm just starting to collect what I can found, and I'm only a starter in this area as well Contributions are welcome Chrome v8 Basic v8 github mirror(docs within)[github] on-stack replacement in v8[article] // multiple articles can be found within A tour of V8: Garbage Collection[article