TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Android 'root' phones via dirtyc0w exploit

143 pointsby Arinerronover 8 years ago

14 comments

bastijnover 8 years ago
I wonder how many people carelessly run a script that downloads, builds, and executed something with root access. If that zip gets compromised (i.e. The source means harm) there is no end to the pain a careless user can endure. It is like blindly copying and running shell commands you don&#x27;t understand with sudo rights.<p>My intention is not to offend the author by the way :). It is to remind people to understand these kind of scripts and their risks before you run them.
评论 #12803231 未加载
评论 #12803259 未加载
评论 #12810012 未加载
评论 #12803216 未加载
edsouzaover 8 years ago
This is just automating running the exploit from here:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;timwr&#x2F;CVE-2016-5195" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;timwr&#x2F;CVE-2016-5195</a>
评论 #12803062 未加载
评论 #12802948 未加载
Arinerronover 8 years ago
I put &#x27;root&#x27; in quotes, because technically, it isn&#x27;t rooting. However, it creates a binary called &#x27;run-as&#x27; that can execute packages as root. Not sure what the right term would be in this case.
评论 #12803074 未加载
评论 #12802893 未加载
评论 #12803158 未加载
评论 #12803343 未加载
Arinerronover 8 years ago
For those who didn&#x27;t see it:<p>I didn&#x27;t write this exploit, I just wrote this script that automates the exploit. The repository with the actual exploit is here htt​ps:&#x2F;&#x2F;g​oo​.​gl&#x2F;f​8HdO7, and the script to automate it is here <a href="https:&#x2F;&#x2F;goo.gl&#x2F;r2dFia" rel="nofollow">https:&#x2F;&#x2F;goo.gl&#x2F;r2dFia</a> .
评论 #12803589 未加载
w23jover 8 years ago
So I have a Galaxy Nexus, which does not get OS Updates anymore (Android 4.3 at the moment).<p>Do I understand correctly that vulnerabilities like this one mean I do not have any protection when I install an App on my phone? I mean the Android permissions system is useless, when any App can just use an exploit to get root isn&#x27;t it?<p>Sorry for the beginner question, I am just hoping I am missing something.
评论 #12803960 未加载
评论 #12803990 未加载
评论 #12804057 未加载
评论 #12803944 未加载
评论 #12804316 未加载
gertyover 8 years ago
For those on CyanogenMod: patch for Dirty COW is about to hit the nightly releases - <a href="https:&#x2F;&#x2F;review.cyanogenmod.org&#x2F;#&#x2F;q&#x2F;19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" rel="nofollow">https:&#x2F;&#x2F;review.cyanogenmod.org&#x2F;#&#x2F;q&#x2F;19be0eaffa3ac7d8eb6784ad9...</a>
dep_bover 8 years ago
I can&#x27;t help but think what would&#x27;ve happened if it were Microsoft that would have security problems of this scale all of the time while essentially blocking users from getting the updates to fix it. And then there&#x27;s the manufacturers abandoning their hardware often directly after release.<p>The angry mob would probably bury them alive...<p>Sure, we can blame carriers, manufacturers and hardware suppliers for having their own policies, but this is the same for your average Windows laptop minus the carriers. Bundled themes and crapware from Sony, Lenovo or Dell never stopped Windows from updating.
评论 #12804213 未加载
gueloover 8 years ago
This is an Android exploit for the Linux privilege escalation bug made public a few days ago, discussed here <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12756006" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12756006</a><p>Hopefully this is where Google&#x27;s app scanning shines and prevents this exploit from spreading.
Arinerronover 8 years ago
Okay, sorry guys. I know it&#x27;s broken right now. The problem is that wget and unzip commands aren&#x27;t being used properly. I can&#x27;t fix it on my phone, because the editor isn&#x27;t working. I won&#x27;t have computer access till tonight (it&#x27;s 4PM here, and I&#x27;m at school). Really sorry about the delay!
评论 #12821783 未加载
orliesaurusover 8 years ago
Good thinking! I wonder if it will get patched soon enough
评论 #12803100 未加载
qwertyuiop924over 8 years ago
Now if only it was permanant...<p>Ah well. I shall have to live with an unrooted S5 for now, unless the rowhammer people come up with something.
评论 #12805153 未加载
pewuover 8 years ago
Is it still possible, when you cannot mount your &#x2F;system partition as rw, because of well... permissions?
评论 #12805471 未加载
radarsat1over 8 years ago
What&#x27;s the story so far? Is this patched in upstream yet? How serious is this bug in general?
bitmapbrotherover 8 years ago
Technically, this is not specific to Android phones. It&#x27;s a hardware flaw and also possible on iOS.<p>edit: Correct, I was confusing it with Row Hammer.
评论 #12802998 未加载
评论 #12802986 未加载
评论 #12802967 未加载