### [CVE-2020-0041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0041) ![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20privilege&color=brighgreen) ### Description In binder_transaction of binder.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145988638References: Upstream kernel ### POC #### Reference No PoCs from references. #### Github - https://github.com/0xT11/CVE-POC - https://github.com/0xZipp0/BIBLE - https://github.com/ARPSyndicate/cvemon - https://github.com/Ashadowkhan/PENTESTINGBIBLE - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/De4dCr0w/Browser-pwn - https://github.com/Escapingbug/awesome-browser-exploit - https://github.com/GhostTroops/TOP - https://github.com/JERRY123S/all-poc - https://github.com/KotenAngered/ZTE-Blade-A5-2019-Nae-Nae-List - https://github.com/Mathankumar2701/ALL-PENTESTING-BIBLE - https://github.com/MedoX71T/PENTESTING-BIBLE - https://github.com/Mr-Anonymous002/awesome-browser-exploit - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/NetKingJ/android-security-awesome - https://github.com/NetKingJ/awesome-android-security - https://github.com/NetW0rK1le3r/PENTESTING-BIBLE - https://github.com/OCEANOFANYTHING/PENTESTING-BIBLE - https://github.com/OpposedDeception/ZTE-Blade-A5-2019-Nae-Nae-List - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Rayyan-appsec/ALL-PENTESTING-BIBLE - https://github.com/Saidul-M-Khan/PENTESTING-BIBLE - https://github.com/allpaca/chrome-sbx-db - https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE - https://github.com/blank156/memek - https://github.com/bluefrostsecurity/CVE-2020-0041 - https://github.com/cwannett/Docs-resources - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/dli408097/pentesting-bible - https://github.com/gmh5225/awesome-game-security - https://github.com/guzzisec/PENTESTING-BIBLE - https://github.com/hacker-insider/Hacking - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hktalent/TOP - https://github.com/j4nn/CVE-2020-0041 - https://github.com/jbmihoub/all-poc - https://github.com/jcalabres/Simple-Keyboard-Keylogger - https://github.com/jcalabres/root-exploit-pixel3 - https://github.com/kdn111/linux-kernel-exploitation - https://github.com/khanhdn111/linux-kernel-exploitation - https://github.com/khanhdz-06/linux-kernel-exploitation - https://github.com/khanhdz191/linux-kernel-exploitation - https://github.com/khanhhdz/linux-kernel-exploitation - https://github.com/khanhhdz06/linux-kernel-exploitation - https://github.com/khanhnd123/linux-kernel-exploitation - https://github.com/knd06/linux-kernel-exploitation - https://github.com/koharin/CVE-2020-0041 - https://github.com/ndk191/linux-kernel-exploitation - https://github.com/nitishbadole/PENTESTING-BIBLE - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/paulveillard/cybersecurity-windows-exploitation - https://github.com/phant0n/PENTESTING-BIBLE - https://github.com/polygraphene/DirtyPipe-Android - https://github.com/readloud/Pentesting-Bible - https://github.com/soosmile/POC - https://github.com/souvik666/chrome0day - https://github.com/ssr-111/linux-kernel-exploitation - https://github.com/trhacknon/Pocingit - https://github.com/vaginessa/CVE-2020-0041-Pixel-3a - https://github.com/weeka10/-hktalent-TOP - https://github.com/xairy/linux-kernel-exploitation - https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References - https://github.com/yusufazizmustofa/BIBLE