[Q]Qualcums Quadrooter vulnerability - Galaxy S3 Neo Q&A, Help & Troubleshooting

Hey,if any of you guys have heard about qualcums Quadrooter bug.
(http://blog.checkpoint.com/2016/08/07/quadrooter/)
I used an app to check and got positive result(affected,vulnerable) (https://play.google.com/store/apps/details?id=com.checkpoint.quadrooter)
-i9300i
-motion rom

Well... "Congrats"... Did you try to look for a patch on how to close that ?
And if even if you patch it... How do you know, that it hasn't been already exploited ?
I have i9300, so I suggest that I'm not affected by this.

Related

Exploit found, patch by Chainfire

I'm not a dev by any sense of the term, just well informed, but I believe this post warrants being here in the development section due to the seriousness of the exploit and the need to find a fix for the camera after applying the patch from Chainfire's app.
All info needed can be found HERE
It is old news and already posted .
http://forum.xda-developers.com/showthread.php?t=2055327
jje
JJEgan said:
It is old news and already posted .
http://forum.xda-developers.com/showthread.php?t=2055327
jje
Click to expand...
Click to collapse
Yes I've read that post and yes this is not new news. The main purpose here is to find a camera fix after applying Chainfire's patch. I've had the .apk patch loaded from the time of its release.
There's a camera fix after the patch found for the SGS3 I9300 linked in the above link.
My hope is the same can be done for our device.
I've been swapping out/replacing .so's from different roms without success so far.
Switching the patch on and off is becoming tedious to say the least.
This exploit patch or i should say the root that come with it also disables hdmi output as an fyi.
Itchiee said:
This exploit patch or i should say the root that come with it also disables hdmi output as an fyi.
Click to expand...
Click to collapse
you mean if I rooted with this patch I will have no working hdmi ?!
Are you sure? I just heard that hdmi doesnt work with a custom recovery.
Sent from my GT-N8010 using Android Central Forums
hoss_n2 said:
you mean if I rooted with this patch I will have no working hdmi ?!
Click to expand...
Click to collapse
Correct, I pulled my hair out for 10 minutes trying to figure out why it wasn't working.
It wasn't until I uninstalled the exploit and SU app, and rebooted, that I was able to output via HDMI and watch my videos.
Other then that I had stock recovery on a stock rom.

S7232 update build date 07/23

Got this update this morning, anyone know what change this has?
Sent from my 306SH
here you can find information Patch info
I am holding off on this update in hopes that a root method will be discovered. But, I am curious to see if they fixed the GraphicsBufferOverflow issue in libui.so and GraphicsBuffer.cpp. (CVE-2015-1474) Sprint is always so vague in their release notes. "Security patch" and "bug fixes" could mean anything. If someone has already applied this update, see if bluebox trust scanner still shows that the vulnerability is present.
Sent from my non-rooted 306SH
TechInMD said:
I am holding off on this update in hopes that a root method will be discovered. But, I am curious to see if they fixed the GraphicsBufferOverflow issue in libui.so and GraphicsBuffer.cpp. (CVE-2015-1474) Sprint is always so vague in their release notes. "Security patch" and "bug fixes" could mean anything. If someone has already applied this update, see if bluebox trust scanner still shows that the vulnerability is present.
Sent from my non-rooted 306SH
Click to expand...
Click to collapse
All Patched.
Would anyone happen to have the 232 update zip laying around?

New exploit available for LG G5: QuadRooter

A set of exploits has been found by Check Point, allowing malicious apps to get root privilege.
blog.checkpoint.com/2016/08/07/quadrooter/
I'll turn off OTA from now on and wait for tools that make use of this exploit.
QuadRooter is a set of four vulnerabilities affecting Android devices built using Qualcomm chipsets. Qualcomm is the world’s leading designer of LTE chipsets with a 65% share of the LTE modem baseband market. If any one of the four vulnerabilities is exploited, an attacker can trigger privilege escalations for the purpose of gaining root access to a device.
Click to expand...
Click to collapse
How do you turn off ota ? I can't find it
there are 4 exploits that are already patched
might be a way if you have pre-April firmware installed
https://gwolf2u.com/quadrooter-android-security-bugs-affect-over-900-million-devices/
I have 3 of the 4 exploits. I have Sprint
I have the latest v10d firmware on my H850 and the app shows me 4 of 4 vulnerable.
2016-06-01 security patch
fsi09 said:
I have the latest v10d firmware on my H850 and the app shows me 4 of 4 vulnerable.
2016-06-01 security patch
Click to expand...
Click to collapse
mine as well
on v10d
H868 reports 4/4 with the latest security patch.
For those who want to root their G5, search for "update" in Settings and turn off auto update.
Is this what we've been waiting for? Ridiculously excited if so, will this help rs988?
muppetmaster916 said:
Is this what we've been waiting for? Ridiculously excited if so, will this help rs988?
Click to expand...
Click to collapse
Download the Quadrooter Scanner and see if 4/4 vulnerabilities. If so, hope is right there.
cdiscrete said:
Download the Quadrooter Scanner and see if 4/4 vulnerabilities. If so, hope is right there.
Click to expand...
Click to collapse
I have 4/4, will this lead to development for our phones?
muppetmaster916 said:
I have 4/4, will this lead to development for our phones?
Click to expand...
Click to collapse
Yes. The last step is a tool that makes use of these vulnerabilities. That's what we are waiting for.
I've looked,searched and looked again.I can not find the turn off automatic updates. Can some one screen shot please. I posted a picture,there is no option for it
On Latest OTA installed, on sprint. I have 3 of the four
4/4 south América H840 variant here, i hope we do get root
AT&T H820, 4/4 shown here with April 01 security update. Will pledge $50 towards the bounty if someone can make use of this.
RS988 with 2016-06-01 Android security patch level. 4/4 vulnerabilities. If this is what we were waiting for, I'm excited!
It's not, I spoke to jcase earlier and he pretty much stated that until a solution to the locked bootloader is found we're screwed. No bump possibility either.
muppetmaster916 said:
It's not, I spoke to jcase earlier and he pretty much stated that until a solution to the locked bootloader is found we're screwed. No bump possibility either.
Click to expand...
Click to collapse
But at least we can get some xposed stuff right?
BR7fan said:
I've looked,searched and looked again.I can not find the turn off automatic updates. Can some one screen shot please. I posted a picture,there is no option for it
Click to expand...
Click to collapse
Seems your Settings is different from mine.
We need a great hacker for this exploit to work..
I will patiently wait

Row hammer root method? (Now Dirty Cow)

Found this on the LG G4 subreddit. Could someone that understands this topic a bit more take a look at this? Seems to be a new exploit.
http://arstechnica.com/security/201...tflips-to-root-android-phones-is-now-a-thing/
Ram is made up of cells in a grid-like pattern inside of a chip. If you know the particular memory location of a specific piece of software you can access the rows above and below with certain patterns of memory accesses and writes. This causes specific bits in the target memory location to change their contents. If the software at that target location happens to handle privilege escalation... This does not rely on buggy software but underlying properties of the ram itself. Some mitigating strategies include address space layout randomization and full encryption of ram. ECC ram can also help with this if you use the error detection abilities to cause an instant device reset.
There's an app to check if you're vulnerable to the Hammer bug.
Devs stated that they've rooted the G4 exploiting it... So... Is there hope for bootloader locked devices after all?
Now I'm a bit pessimistic about this mainly due to the fact that there have been several exploits since MM which didn't really help our situation. The only difference here is they've claimed that they were able to root our specific device using this method which is promising I suppose.
Some budy red about dirty cow bug in Linux kernel?
Wysłane z mojego LG-H815 przy użyciu Tapatalka
This actually seems very, very good news. I will try to get my hands on an apk and try it.
Link to the apk:
https://vvdveen.com/drammer/drammer.apk
It doesn't do anything.
It does not do anything YET. The researchers said that they did not release the exploit and are not so inclined to do so. I got a warning about the apk being malicious. Maybe someone will create an app in good faith that will only root out phones.
tmihai20 said:
It does not do anything YET. The researchers said that they did not release the exploit and are not so inclined to do so. I got a warning about the apk being malicious. Maybe someone will create an app in good faith that will only root out phones.
Click to expand...
Click to collapse
EN: It was a statement. I know that it does nothing. It is just a test. It doesn't root your phone.
RO: Era o afirmatie. Doar intaream ideea ca e un test si ca nu ajuta cu nimic in cazul de fata (si anume la root).
Yeah the app is simply to find out which phones are vulnerable.
I want to use Drammer to root my phone. Where can I download the exploit code?
You cannot. We decided to not (yet) release the exploit. We did open source our templating code, however.
So, maybe we need to wait until November Security Patch Release.
LaughingCarrot said:
Yeah the app is simply to find out which phones are vulnerable.
Click to expand...
Click to collapse
Exactly. Actually I ran it on my g4 and returned that it is not even exploitable
I think it takes some time, especially with the 3 GB of RAM. That slider is not very, very useful. I use the more aggressive approach and it killed the app itself. They said they ran it on a G4 and some other phones.
Dirty Cow, on the other hand, sounds a lot quicker. Looking forward to it.
Hopefully.
I think we just got the first dirty cow exploit for Android. This developer used it to root a V20 with Nougat https://github.com/jcadduono/android_external_dirtycow
tmihai20 said:
I think we just got the first dirty cow exploit for Android. This developer used it to root a V20 with Nougat https://github.com/jcadduono/android_external_dirtycow
Click to expand...
Click to collapse
I have to add that he has an unlocked bootloader.
But of course, it gives us more Hope
tmihai20 said:
I think we just got the first dirty cow exploit for Android. This developer used it to root a V20 with Nougat https://github.com/jcadduono/android_external_dirtycow
Click to expand...
Click to collapse
Yeah that method involved unlocking the bootloader so it's a little different. We need some sort of systemless root.
Any release on the row hammer exploit yet? :1 We need more researchers u.u

Is OP5 getting a KRACK update?

Just wondering.
Google is patching it in a few weeks for their Nov patching. I hope Oneplus takes it seriously and we see it soon after. Id say sometime in December
That's included in the monthly security patches. It all depends when Google release the patch and when OnePlus releases an OTA with said patch.
Custom ROMs should getting fairly fast though.
According to androidcentral.com, this issue is fixed in the November, 6th 2017 security patch (n the 4.5.13 OOS upadate, the security patch is September.). The best thing to do is to wait for this patch to be deployed by oneplus and use only mobile data in the meantime
As far as I understood it's a problem within wpa_supplicant. Isn't there a chance to fix this with, e. g. a MAGISK Module?
Omnirom 7.1.2 released a update today, its fixed already
Anyway news on KRACK fix in OOS?
bigtreiber said:
Anyway news on KRACK fix in OOS?
Click to expand...
Click to collapse
It's not fixed yet...
Still no news on the KRACK Fix ... oneplus must be working on the 5T ... sad that the flagship from May gets so little support ...
It's on the latest update, kinda stupid that it's not Rolling out to everyone at the same time
Yes, it's fixed
You can get OOS 4.5.14 right now if you use xXx's no limits OOS based ROM
But if you want to stay on stock waiting is the best thing to do
Pro4TLZZ said:
It's on the latest update, kinda stupid that it's not Rolling out to everyone at the same time
Click to expand...
Click to collapse
Or u can just flash it which is available now
the_rooter said:
Or u can just flash it which is available now
Click to expand...
Click to collapse
Does the average user who doesn't visit xda know about that?
Pro4TLZZ said:
Does the average user who doesn't visit xda know about that?
Click to expand...
Click to collapse
The main user base of op5 are on xda or know about flashing it because it's on the OnePlus page
Pro4TLZZ said:
It's on the latest update, kinda stupid that it's not Rolling out to everyone at the same time
Click to expand...
Click to collapse
If you are running stock unmodified OOS with stock recovery, just download turbo vpn on playstore and set your location to Germany. Then check for the update, you will get it right away. No need to wait!
I think people are saying the 4.5.14 update has the fix (don't quote me on this though)
Now that the latest build fixes this Krack issue, Moderators can close this thread.

Categories

Resources