Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-2215

Description

A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095

POC

Reference

- http://packetstormsecurity.com/files/154911/Android-Binder-Use-After-Free.html

- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html

- http://packetstormsecurity.com/files/156495/Android-Binder-Use-After-Free.html

Github

- https://github.com/0xT11/CVE-POC

- https://github.com/0xbinder/android-kernel-exploitation-lab

- https://github.com/0xor0ne/awesome-list

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ATorNinja/CVE-2019-2215

- https://github.com/Al1ex/LinuxEelvation

- https://github.com/Bariskizilkaya/Android-kernel-emulation-with-QEMU

- https://github.com/BlackTom900131/awesome-game-security

- https://github.com/Byte-Master-101/CVE-2019-2215

- https://github.com/Clock-Skew/EndPointX

- https://github.com/CrackerCat/Rootsmart-v2.0

- https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections

- https://github.com/DimitriFourny/cve-2019-2215

- https://github.com/DuncanParSky/awesome-android-root-exploits

- https://github.com/GiorgosXou/Our-Xiaomi-Redmi-5A-riva-debloating-list

- https://github.com/HacTF/poc--exp

- https://github.com/IamAlch3mist/Awesome-Android-Vulnerability-Research

- https://github.com/Jalexander798/JA_Tools-Cybersecurity-Resource-2

- https://github.com/Joseph-CHC/reseach_list

- https://github.com/Karma2424/cve2019-2215-3.18

- https://github.com/LIznzn/CVE-2019-2215

- https://github.com/MrAgrippa/nes-01

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/Panopticon-Project/panopticon-APT-C-35

- https://github.com/Panopticon-Project/panopticon-Donot

- https://github.com/Panopticon-Project/panopticon-Sidewinder

- https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker

- https://github.com/R0rt1z2/huawei-unlock

- https://github.com/SteveZMTstudios/sharepoint

- https://github.com/Stoobyy/Kyocera-A101BM-Exploitation

- https://github.com/Thehepta/android-jailbreak

- https://github.com/XiaozaYa/CVE-2019-2215

- https://github.com/aguerriero1998/Umass-CS-590J-Capstone-Project

- https://github.com/alphaSeclab/sec-daily-2019

- https://github.com/avboy1337/Vulnerabilities

- https://github.com/bachkhoasoft/awesome-list-ks

- https://github.com/bb33bb/Vulnerabilities

- https://github.com/c3r34lk1ll3r/CVE-2019-2215

- https://github.com/cutesmilee/pocs

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/eeenvik1/scripts_for_YouTrack

- https://github.com/elbiazo/CVE-2019-2215

- https://github.com/enceka/1

- https://github.com/enceka/SharpS1GetRoot

- https://github.com/enceka/cve-2019-2215-3.18

- https://github.com/fei9747/LinuxEelvation

- https://github.com/frankzappasmustache/starred-repos

- https://github.com/gmh5225/awesome-game-security

- https://github.com/grant-h/qu1ckr00t

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/jpacg/awesome-stars

- https://github.com/jsirichai/CVE-2019-2215

- https://github.com/kangtastic/cve-2019-2215

- https://github.com/kdn111/linux-kernel-exploitation

- https://github.com/khanhdn111/linux-kernel-exploitation

- https://github.com/khanhdz-06/linux-kernel-exploitation

- https://github.com/khanhdz191/linux-kernel-exploitation

- https://github.com/khanhhdz/linux-kernel-exploitation

- https://github.com/khanhhdz06/linux-kernel-exploitation

- https://github.com/khanhnd123/linux-kernel-exploitation

- https://github.com/khnhdz/linux-kernel-exploitation

- https://github.com/knd06/linux-kernel-exploitation

- https://github.com/llccd/TempRoot-Huawei

- https://github.com/locus-x64/android-kernel-exploitation-lab

- https://github.com/marcinguy/CVE-2019-2215

- https://github.com/mouseos/cve-2019-2215_SH-M08

- https://github.com/mufidmb38/CVE-2019-2215

- https://github.com/mutur4/CVE-2019-2215

- https://github.com/ndk06/linux-kernel-exploitation

- https://github.com/ndk191/linux-kernel-exploitation

- https://github.com/nicchongwb/Rootsmart-v2.0

- https://github.com/nighthawkk/Binary-Kernel-Android-Exploitation-Roadmap

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/pengusec/awesome-netsec-articles

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/qre0ct/android-kernel-exploitation-ashfaq-CVE-2019-2215

- https://github.com/raymontag/CVE-2019-2215

- https://github.com/raystyle/CVE-2019-2215

- https://github.com/robertfischman/game-security

- https://github.com/saga0324/android_device_sharp_sh8996

- https://github.com/sharif-dev/AndroidKernelVulnerability

- https://github.com/ssr-111/linux-kernel-exploitation

- https://github.com/stevejubx/CVE-2019-2215

- https://github.com/su-vikas/Mobile-Attack-Vectors

- https://github.com/tdcoming/Vulnerability-engine

- https://github.com/themmokhtar/CVE-2020-0022

- https://github.com/timwr/CVE-2019-2215

- https://github.com/trevor0106/game-security

- https://github.com/wateroot/poc-exp

- https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite

- https://github.com/wkhnh06/linux-kernel-exploitation

- https://github.com/wrlu/Vulnerabilities

- https://github.com/xairy/linux-kernel-exploitation

- https://github.com/yud121212/Linux_Privilege_Escalation