Malware in Galaxy S3, Galaxy Note 2, and other Android handsets

You may also like...

2 Responses

  1. georgi says:

    The exploit can be found HERE:http://forum.xda-developers.com/showthread.php?p=35469999#post35469999

    [ROOT][SECURITY] Root exploit on Exynos

    Recently discover a way to obtain root on S3 without ODIN flashing.
    The security hole is in kernel, exactly with the device /dev/exynos-mem.
    This device is R/W by all users and give access to all physical memory … what’s wrong with Samsung ?
    Its like /dev/mem but for all.
    Three libraries seems to use /dev/exynos-mem:

    /system/lib/hw/camera.smdk4x12.so
    /system/lib/hw/gralloc.smdk4x12.so
    /system/lib/libhdmi.so

    Many devices are concerned :

    Samsung Galaxy S2
    Samsung Galxy Note 2
    MEIZU MX
    potentialy all devices who embed exynos processor (4210 and 4412) which use Samsung kernel sources.

    The good news is we can easily obtain root on these devices and the bad is there is no control over it.

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.