Backdoor Found in HTC EVO & Sprint Hero, Exploited to Gain Root Access
- sending and monitor user tap and drag input (“PentapHook”),
- sending key events (“InputCapture”),
- dumping the framebuffer (“captureScreen”),
- listing processes (“GetProc”),
- rebooting the device immediately,
- and executing arbitrary shell commands as root (“LaunchChild”)
It was skyagent that unrevoked used for their 1-click root method that can be found at unrevoked.com
Likewise, hstools was another executable binary that could be used to pass command input to the phone with root permission. Hstools was exploited by unrevoked after skyagent was removed by the EVO launch-day OTA update.
Unrevoked makes a point to mention that they do not believe that either HTC or Sprint had any malicious intent with regards to these two vulnerabilities. It is believed that skyagent was a debugging binary that was never removed from the phone before official release. Unrevoked goes on to praise Google, HTC, and Sprint for their efforts in patching the vulnerabilities and provides a timeline of events:
- 31 May 2010 23:53:08 EDT: Google security notified about skyagent
- 01 Jun 2010 03:53:30 UTC: Automated Google response
- 01 Jun 2010 16:45:46 UTC: Response from Google Security Team
- 02 Jun 2010 23:18:31 EDT: Sprint security contacted about skyagent
- 03 Jun 2010 01:18:58 CDT: Sprint response
- 04 Jun 2010: Sprint OTA update removingskyagent binary.
- 30 Jun 2010: Sprint OTA update patchinghstools vulnerability.
You might also like
One of our absolute favorite things about Android is the fact that you can bend and tweak the platform to your needs. Sure, there’s rooting and modding for deep level
Recently uncovered FCC documents indicate that T-Mobile and Huawei me be working together on another handset. The filing shows the phone to have support for T-Mobile’s AWS bands among other decent sounding specs. The carrier currently offers the Huawei “Comet” as part of their pre-paid stable so this IDEOS X6 could be a potential successor.