このページはEtoJ逐語翻訳フィルタによって翻訳生成されました。

翻訳前ページへ


安全 研究 by Dan Rosenberg

It's Bugs All the Way 負かす/撃墜する

安全 研究 by Dan Rosenberg

Xoom FE: Stupid Bugs, and More Plagiarism

Someone について言及するd to me that yesterday’s root for the Motorola XYBoard appeared to not work on the Xoom Family 版 (FE), so I took a look. What I 設立する was a 始める,決める of vulnerabilities so egregious that it’s hard to not draw comparisons to a 審議する/熟考する backdoor.

Plagiarism for 利益(をあげる)

After doing some 研究 on what’s been done on this 装置 in the past, I 設立する that it has 明らかに been rooted before, 事前の to the most 最近の OTA update. Someone by the 指名する of “Evil_DevNull” published a root 偉業/利用する here, that appeared to take advantage of a 命令(する) 注射 vulnerability in a 公共事業(料金)/有用性 called “cmdclient”. He then proceeded to 繰り返して request and receive 通貨の 寄付s. This would all be 罰金 (寄付するing to developers is a good way to support their さもなければ 未払いの work), except Evil_DevNull seems to have ripped off the 偉業/利用する used here to root the Acer Iconia A100, which is just a variation on an 偉業/利用する published as “iconiaroot” here, authored by “sc2k”. Congratulations, Evil_DevNull, you’ve managed to 利益(をあげる) by ripping off someone else’s 偉業/利用する without credit!

Stupidest Root Ever?

Anyway, 支援する to the fun stuff. After 確認するing that cmdclient is 任命する/導入するd setuid root, I pulled up IDA and took a look at what it does. What I saw was so broken it was hard to believe.

The first few arguments cmdclient supports are “ec_recovery”, “ec_btmac”, “ec_snid”, “ec_skunumber”, and “ec_imeiwithbarcode”. Each of these 命令(する)s builds a 命令(する) string using the second argument (such as “echo [arg] > /sys//EcControl/RecoveryMode”) and 遂行する/発効させるs it using system(). These are all trivial 命令(する) 注射 vulnerabilities: something like “cmdclient ec_skunumber ‘; [my cmd];'” 作品 罰金 to 遂行する/発効させる 独断的な 命令(する)s as root. Ok, 装置 rooted, that was 平易な.

But one of the other cmdclient 選択s was so ridiculous that it’s hard to believe it isn’t a 審議する/熟考する backdoor. “cmdclient sys_open” will 成し遂げる a “chmod 777 /data” and “chmod 777 /(武器などの)隠匿場所”, の中で a few other things, which 明白に 手足を不自由にする/(物事を)損なうs the 安全 of the 装置 and 許すs 伸び(る)ing root yet again. They might 同様に 改名する the 使用/適用 “own_my_device_now”.

Download

If you’re a Xoom FE owner, you can download a Windows root script here or a Linux/OSX 見解/翻訳/版 here. 任命する/導入する the appropriate Motorola drivers, connect your 装置 経由で USB, 抽出する the appropriate zip, and 遂行する/発効させる “run.bat” (on Windows) or “run.sh” from a 終点 (on Linux/OSX). Enjoy.

This 入ること/参加(者) was 地位,任命するd on Saturday, February 18th, 2012 at 5:20 pm and is とじ込み/提出するd under Android, 開発/利用. You can follow any 返答s to this 入ること/参加(者) through the RSS 2.0 料金d. Both comments and pings are 現在/一般に の近くにd.