UpdatedNov 6, 2013
PublishedNov 6, 2013
Packagetungstwenty.xposed.masterkeydualfix
MD5d06bd0c69a81b5006c85a1961a741186
SHA1 (signer)AB:19:48:64:17:9E:96:49:C7:02:73:B8:41:4B:33:3A:7E:0C:48:24
Signed byCN=Tungstwenty, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=PT
Malware scanTRUSTED
Contact[email protected]
Description
Requires theXposed Framework. Grab it athttp://forum.xda-developers.com/showthread.php?t=1574401and make sure it runs properly on your device.ROOTonly required for installing the Xposed Framework, it can be dropped afterwards.
This app patches severalvulnerability issuesfound on Android collectively known as 'Master Key' exploits:
- bug 8219321
- bug 9695860
- bug 9950697
In general terms, these allow exploiting signed APKs by replacing the code they contain while maintaining the existing signature valid (hence the term 'Master Key'), leading you to think the original author is someone you trust.
The original Android sources have been corrected to fix these problems, but it might take a while
till stock ROMs include the fixes, if ever.
To check if you're vulnerable, you can use other apps available on the store such as SRT AppScanner (https://play.google.com/store/apps/details?id=de.backessrt.appintegrity) or Bluebox Security Scanner (https://play.google.com/store/apps/details?id=com.bluebox.labs.onerootscanner).Note: If using Bluebox Security Scanner, make sure to force a refresh on the app once the fix is applied, otherwise you might get a cached and incorrect result.
For any questions or to support my work, please visithttp://forum.xda-developers.com/showthread.php?t=2365294
This app patches severalvulnerability issuesfound on Android collectively known as 'Master Key' exploits:
- bug 8219321
- bug 9695860
- bug 9950697
In general terms, these allow exploiting signed APKs by replacing the code they contain while maintaining the existing signature valid (hence the term 'Master Key'), leading you to think the original author is someone you trust.
The original Android sources have been corrected to fix these problems, but it might take a while
till stock ROMs include the fixes, if ever.
To check if you're vulnerable, you can use other apps available on the store such as SRT AppScanner (https://play.google.com/store/apps/details?id=de.backessrt.appintegrity) or Bluebox Security Scanner (https://play.google.com/store/apps/details?id=com.bluebox.labs.onerootscanner).Note: If using Bluebox Security Scanner, make sure to force a refresh on the app once the fix is applied, otherwise you might get a cached and incorrect result.
For any questions or to support my work, please visithttp://forum.xda-developers.com/showthread.php?t=2365294
Required features
- Touchscreen android.hardware.touchscreen