Source: https://code.google.com/p/google-security-research/issues/detail?id=500 There is a crash when the Samsung Gallery application load the attached GIF, colormap.gif. D/skia(10905): GIF - Parse error D/skia(10905): --- decoder->decode returned false F/libc(10905): Fatal signal 11 (SIGSEGV), code 2, fault addr 0x89f725ac in tid 11276 (thread-pool-0) I/DEBUG ( 2958): pid: 10905, tid: 11276, name: thread-pool-0>>> com.sec.android.gallery3d <<< I/DEBUG ( 2958): signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x89f725ac I/DEBUG ( 2958): x0 0000000000000001x1 0000000089f725acx2 0000000000000000x3 00000000fff9038c I/DEBUG ( 2958): x4 0000007f9c300000x5 000000000000001fx6 0000000000000001x7 0000007f9c620048 I/DEBUG ( 2958): x8 0000000000000000x9 0000000000000000x100000000000000080x110000000000003758 I/DEBUG ( 2958): x120000000000000020x130000000000000020x1400000000000000a5x15000000000000001f I/DEBUG ( 2958): x1600000000ffffe4e3x1700000000000000a5x180000007f9c300000x190000007f9c61fc00 I/DEBUG ( 2958): x200000007f9c664080x210000000089e76b2cx22000000000000003bx230000000000000001 I/DEBUG ( 2958): x240000000000000020x250000000000000020x260000000000000020x270000007f9c664080 I/DEBUG ( 2958): x2800000000000001dax290000000032e89ae0x300000007faad70e64 I/DEBUG ( 2958): sp 0000007f9cfff170pc 0000007faad72dbcpstate 0000000080000000 I/DEBUG ( 2958): I/DEBUG ( 2958): backtrace: I/DEBUG ( 2958): #00 pc 000000000002ddbc/system/lib64/libSecMMCodec.so (ColorMap+200) I/DEBUG ( 2958): #01 pc 000000000002be60/system/lib64/libSecMMCodec.so (decodeGIF+340) I/DEBUG ( 2958): #02 pc 000000000000c90c/system/lib64/libSecMMCodec.so (Java_com_sec_samsung_gallery_decoder_SecMMCodecInterface_nativeDecode+436) I/DEBUG ( 2958): #03 pc 000000000042ec00/system/priv-app/SecGallery2015/arm64/SecGallery2015.odex To reproduce, download the file and open it in Gallery Proof of Concept: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38610.zip
体验盒子