Skip to content

CunningLogic/PixelDump_CVE-2016-8462

master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
src
 
 
 
 
 
 
 
 

PixelDump - CVE-2016-8462

PixelDump (CVE-2016-8462) was one of Pixel bootloader vulnerabilities found/worked out by beaups and Jon 'jcase' Sawyer.

Disclaimer

This is a dirty POC that was never intended to be released, I just copied another project, spent a few minutes adding a few lines, and sent it to Google to boost our bounty reward amount. Lame yes. Working(ish) yes.

Let me repeat, this is AWFUL code. Do not actually assume you can use this for anything.

Details

This vulnerability allows you to effectively 'read' data off the device while in bootloader mode, even with a locked bootloader.

While many people found the vulnerability, we found it first and managed to collect $4000 for it from Google, which we donated to the Clallam County Special Olympics. Vulnerability was also found by the Roee Hay at IBM, he has a write up at https://securityresear.ch/2017/01/04/fastboot-oem-sha1sum/ if you want details. He describes it quite well.

About

Pixel bootlaoder exploit for reading flash storage

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages