Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 01-21 15:06:10.078 W/View ( 3706): requestLayout() improperly called by com.android.systemui.statusbar.phone.IconMerger{cb60a46 V.E...... ......I. 0,0-108,72 #7f0f00c7 app:id/notificationIcons} during layout: running second layout pass
- 01-21 15:06:11.140 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie]
- 01-21 15:06:11.140 I/System.out(12545): null
- 01-21 15:06:11.140 I/System.out(12545): null
- 01-21 15:06:11.143 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright MethodName:exec
- 01-21 15:06:11.267 W/View ( 3706): requestLayout() improperly called by com.android.systemui.statusbar.phone.IconMerger{cb60a46 V.E...... ........ 0,0-108,72 #7f0f00c7 app:id/notificationIcons} during second layout pass: posting in next frame
- 01-21 15:06:11.282 I/[Gralloc]( 2838): alloc w[1218] h[891] format[1] usage[2816]
- 01-21 15:06:11.285 I/[Gralloc]( 2838): alloc succ handle[0x5595ec1f20] stride[1248]
- 01-21 15:06:11.285 I/[Gralloc]( 2838): alloc w[1218] h[891] format[1] usage[2816]
- 01-21 15:06:11.288 I/[Gralloc]( 2838): alloc succ handle[0x559603a890] stride[1248]
- 01-21 15:06:11.288 I/[Gralloc]( 2838): alloc w[1218] h[891] format[1] usage[2816]
- 01-21 15:06:11.292 I/[Gralloc]( 2838): alloc succ handle[0x5595ee5220] stride[1248]
- 01-21 15:06:11.298 E/GraphicBuffer(12545): unflatten: numFds or numInts is too large: 4096, 4085
- 01-21 15:06:11.298 I/HwSecImmHelper(12545): mSecurityInputMethodService is null
- 01-21 15:06:11.304 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
- 01-21 15:06:11.304 I/System.out(12545): null
- 01-21 15:06:11.304 I/System.out(12545): null
- 01-21 15:06:11.304 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
- 01-21 15:06:11.339 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-1.mp4]
- 01-21 15:06:11.339 I/System.out(12545): null
- 01-21 15:06:11.339 I/System.out(12545): null
- 01-21 15:06:11.340 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
- 01-21 15:06:11.550 I/OMXClient(12601): Using client-side OMX mux.
- 01-21 15:06:11.573 I/FFMPEGExtractor(12601): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-1.mp4]
- 01-21 15:06:11.584 E/ffmpeg-avlog(12601): error reading header
- 01-21 15:06:11.584 E/FFMPEGExtractor(12601): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-1.mp4
- 01-21 15:06:11.584 W/MediaExtractor(12601): Delete extractor since no track find.
- 01-21 15:06:11.590 W/System.err(12545): java.lang.Exception: Test error
- 01-21 15:06:11.590 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
- 01-21 15:06:11.590 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
- 01-21 15:06:11.590 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
- 01-21 15:06:11.590 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
- 01-21 15:06:11.590 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 01-21 15:06:11.590 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
- 01-21 15:06:11.590 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
- 01-21 15:06:11.590 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
- 01-21 15:06:11.590 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
- 01-21 15:06:11.592 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
- 01-21 15:06:11.592 I/System.out(12545): null
- 01-21 15:06:11.592 I/System.out(12545): null
- 01-21 15:06:11.592 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
- 01-21 15:06:11.628 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-2.mp4]
- 01-21 15:06:11.628 I/System.out(12545): null
- 01-21 15:06:11.628 I/System.out(12545): null
- 01-21 15:06:11.629 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
- 01-21 15:06:11.887 I/OMXClient(12606): Using client-side OMX mux.
- 01-21 15:06:11.901 I/SampleTable(12606): There are reordered frames present.
- 01-21 15:06:11.901 I/FFMPEGExtractor(12606): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-2.mp4]
- 01-21 15:06:11.902 E/ffmpeg-avlog(12606): error reading header
- 01-21 15:06:11.902 E/FFMPEGExtractor(12606): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-2.mp4
- 01-21 15:06:11.902 W/MediaExtractor(12606): Delete extractor since no track find.
- 01-21 15:06:11.907 W/System.err(12545): java.lang.Exception: Test error
- 01-21 15:06:11.907 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
- 01-21 15:06:11.907 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
- 01-21 15:06:11.907 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
- 01-21 15:06:11.907 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
- 01-21 15:06:11.907 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 01-21 15:06:11.907 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
- 01-21 15:06:11.907 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
- 01-21 15:06:11.907 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
- 01-21 15:06:11.907 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
- 01-21 15:06:11.910 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
- 01-21 15:06:11.910 I/System.out(12545): null
- 01-21 15:06:11.911 I/System.out(12545): null
- 01-21 15:06:11.911 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
- 01-21 15:06:11.950 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-3.mp4]
- 01-21 15:06:11.950 I/System.out(12545): null
- 01-21 15:06:11.950 I/System.out(12545): null
- 01-21 15:06:11.950 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
- 01-21 15:06:12.201 I/OMXClient(12609): Using client-side OMX mux.
- 01-21 15:06:12.212 I/FFMPEGExtractor(12609): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-3.mp4]
- 01-21 15:06:12.213 E/ffmpeg-avlog(12609): error reading header
- 01-21 15:06:12.213 E/FFMPEGExtractor(12609): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-3.mp4
- 01-21 15:06:12.213 W/MediaExtractor(12609): Delete extractor since no track find.
- 01-21 15:06:12.217 W/System.err(12545): java.lang.Exception: Test error
- 01-21 15:06:12.217 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
- 01-21 15:06:12.217 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
- 01-21 15:06:12.217 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
- 01-21 15:06:12.217 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
- 01-21 15:06:12.217 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 01-21 15:06:12.217 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
- 01-21 15:06:12.217 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
- 01-21 15:06:12.217 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
- 01-21 15:06:12.217 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
- 01-21 15:06:12.220 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
- 01-21 15:06:12.220 I/System.out(12545): null
- 01-21 15:06:12.220 I/System.out(12545): null
- 01-21 15:06:12.220 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
- 01-21 15:06:12.255 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-4.mp4]
- 01-21 15:06:12.255 I/System.out(12545): null
- 01-21 15:06:12.255 I/System.out(12545): null
- 01-21 15:06:12.255 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
- 01-21 15:06:12.468 I/OMXClient(12615): Using client-side OMX mux.
- 01-21 15:06:12.483 I/FFMPEGExtractor(12615): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-4.mp4]
- 01-21 15:06:12.485 E/ffmpeg-avlog(12615): error reading header
- 01-21 15:06:12.485 E/FFMPEGExtractor(12615): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-4.mp4
- 01-21 15:06:12.485 W/MediaExtractor(12615): Delete extractor since no track find.
- 01-21 15:06:12.490 W/System.err(12545): java.lang.Exception: Test error
- 01-21 15:06:12.491 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
- 01-21 15:06:12.491 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
- 01-21 15:06:12.491 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
- 01-21 15:06:12.491 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
- 01-21 15:06:12.491 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 01-21 15:06:12.491 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
- 01-21 15:06:12.491 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
- 01-21 15:06:12.491 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
- 01-21 15:06:12.491 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
- 01-21 15:06:12.494 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
- 01-21 15:06:12.494 I/System.out(12545): null
- 01-21 15:06:12.494 I/System.out(12545): null
- 01-21 15:06:12.495 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
- 01-21 15:06:12.542 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1539.mp4]
- 01-21 15:06:12.542 I/System.out(12545): null
- 01-21 15:06:12.542 I/System.out(12545): null
- 01-21 15:06:12.543 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
- 01-21 15:06:12.754 I/OMXClient(12619): Using client-side OMX mux.
- 01-21 15:06:12.765 I/FFMPEGExtractor(12619): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1539.mp4]
- 01-21 15:06:12.766 E/ffmpeg-avlog(12619): moov atom not found
- 01-21 15:06:12.766 E/FFMPEGExtractor(12619): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1539.mp4
- 01-21 15:06:12.766 W/MediaExtractor(12619): Delete extractor since no track find.
- 01-21 15:06:12.771 W/System.err(12545): java.lang.Exception: Test error
- 01-21 15:06:12.772 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
- 01-21 15:06:12.772 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
- 01-21 15:06:12.772 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
- 01-21 15:06:12.772 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
- 01-21 15:06:12.772 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 01-21 15:06:12.772 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
- 01-21 15:06:12.772 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
- 01-21 15:06:12.772 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
- 01-21 15:06:12.772 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
- 01-21 15:06:12.777 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
- 01-21 15:06:12.777 I/System.out(12545): null
- 01-21 15:06:12.777 I/System.out(12545): null
- 01-21 15:06:12.778 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
- 01-21 15:06:12.826 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3824.mp4]
- 01-21 15:06:12.826 I/System.out(12545): null
- 01-21 15:06:12.827 I/System.out(12545): null
- 01-21 15:06:12.827 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
- 01-21 15:06:13.068 I/OMXClient(12623): Using client-side OMX mux.
- 01-21 15:06:13.086 I/FFMPEGExtractor(12623): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3824.mp4]
- 01-21 15:06:13.087 E/FFMPEGExtractor(12623): Can not find video stream!
- 01-21 15:06:13.087 W/FFMPEGExtractor(12623): Can not find audio stream!
- 01-21 15:06:13.087 E/FFMPEGExtractor(12623): Couldn't find audio stream and video stream!
- 01-21 15:06:13.087 W/MediaExtractor(12623): Delete extractor since no track find.
- 01-21 15:06:13.093 W/System.err(12545): java.lang.Exception: Test error
- 01-21 15:06:13.094 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
- 01-21 15:06:13.094 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
- 01-21 15:06:13.094 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
- 01-21 15:06:13.094 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
- 01-21 15:06:13.094 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 01-21 15:06:13.094 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
- 01-21 15:06:13.094 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
- 01-21 15:06:13.094 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
- 01-21 15:06:13.094 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
- 01-21 15:06:13.099 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
- 01-21 15:06:13.099 I/System.out(12545): null
- 01-21 15:06:13.099 I/System.out(12545): null
- 01-21 15:06:13.100 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
- 01-21 15:06:13.148 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3828.mp4]
- 01-21 15:06:13.149 I/System.out(12545): null
- 01-21 15:06:13.149 I/System.out(12545): null
- 01-21 15:06:13.149 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
- 01-21 15:06:13.418 I/OMXClient(12627): Using client-side OMX mux.
- 01-21 15:06:13.436 I/FFMPEGExtractor(12627): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3828.mp4]
- 01-21 15:06:13.436 E/FFMPEGExtractor(12627): FFmpeg can not find the streams or codec!
- 01-21 15:06:13.436 W/MediaExtractor(12627): Delete extractor since no track find.
- 01-21 15:06:13.441 W/System.err(12545): java.lang.Exception: Test error
- 01-21 15:06:13.441 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
- 01-21 15:06:13.441 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
- 01-21 15:06:13.441 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
- 01-21 15:06:13.441 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
- 01-21 15:06:13.441 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 01-21 15:06:13.441 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
- 01-21 15:06:13.441 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
- 01-21 15:06:13.441 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
- 01-21 15:06:13.441 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
- 01-21 15:06:13.443 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
- 01-21 15:06:13.443 I/System.out(12545): null
- 01-21 15:06:13.443 I/System.out(12545): null
- 01-21 15:06:13.444 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
- 01-21 15:06:13.476 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3829.mp4]
- 01-21 15:06:13.476 I/System.out(12545): null
- 01-21 15:06:13.476 I/System.out(12545): null
- 01-21 15:06:13.477 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
- 01-21 15:06:13.719 I/OMXClient(12633): Using client-side OMX mux.
- 01-21 15:06:13.731 I/FFMPEGExtractor(12633): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3829.mp4]
- 01-21 15:06:13.732 E/ffmpeg-avlog(12633): moov atom not found
- 01-21 15:06:13.732 E/FFMPEGExtractor(12633): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3829.mp4
- 01-21 15:06:13.732 W/MediaExtractor(12633): Delete extractor since no track find.
- 01-21 15:06:13.737 W/System.err(12545): java.lang.Exception: Test error
- 01-21 15:06:13.737 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
- 01-21 15:06:13.737 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
- 01-21 15:06:13.738 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
- 01-21 15:06:13.738 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
- 01-21 15:06:13.738 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 01-21 15:06:13.738 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
- 01-21 15:06:13.738 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
- 01-21 15:06:13.738 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
- 01-21 15:06:13.738 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
- 01-21 15:06:13.743 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
- 01-21 15:06:13.743 I/System.out(12545): null
- 01-21 15:06:13.743 I/System.out(12545): null
- 01-21 15:06:13.744 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
- 01-21 15:06:13.797 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3864.mp4]
- 01-21 15:06:13.797 I/System.out(12545): null
- 01-21 15:06:13.797 I/System.out(12545): null
- 01-21 15:06:13.797 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
- 01-21 15:06:14.060 I/OMXClient(12638): Using client-side OMX mux.
- 01-21 15:06:14.075 I/FFMPEGExtractor(12638): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3864.mp4]
- 01-21 15:06:14.076 E/FFMPEGExtractor(12638): Can not find video stream!
- 01-21 15:06:14.077 W/FFMPEGExtractor(12638): Can not find audio stream!
- 01-21 15:06:14.077 E/FFMPEGExtractor(12638): Couldn't find audio stream and video stream!
- 01-21 15:06:14.077 W/MediaExtractor(12638): Delete extractor since no track find.
- 01-21 15:06:14.083 W/System.err(12545): java.lang.Exception: Test error
- 01-21 15:06:14.083 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
- 01-21 15:06:14.083 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
- 01-21 15:06:14.083 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
- 01-21 15:06:14.083 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
- 01-21 15:06:14.083 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 01-21 15:06:14.083 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
- 01-21 15:06:14.084 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
- 01-21 15:06:14.084 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
- 01-21 15:06:14.084 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
- 01-21 15:06:14.088 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
- 01-21 15:06:14.088 I/System.out(12545): null
- 01-21 15:06:14.088 I/System.out(12545): null
- 01-21 15:06:14.089 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
- 01-21 15:06:14.132 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/sf-itunes-poc.mp4]
- 01-21 15:06:14.132 I/System.out(12545): null
- 01-21 15:06:14.132 I/System.out(12545): null
- 01-21 15:06:14.132 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
- 01-21 15:06:14.385 I/OMXClient(12642): Using client-side OMX mux.
- 01-21 15:06:14.407 I/FFMPEGExtractor(12642): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/sf-itunes-poc.mp4]
- 01-21 15:06:14.408 E/FFMPEGExtractor(12642): FFmpeg can not find the streams or codec!
- 01-21 15:06:14.408 W/MediaExtractor(12642): Delete extractor since no track find.
- 01-21 15:06:14.413 W/System.err(12545): java.lang.Exception: Test error
- 01-21 15:06:14.414 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
- 01-21 15:06:14.414 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
- 01-21 15:06:14.414 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
- 01-21 15:06:14.414 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
- 01-21 15:06:14.414 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 01-21 15:06:14.414 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
- 01-21 15:06:14.414 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
- 01-21 15:06:14.414 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
- 01-21 15:06:14.414 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
- 01-21 15:06:14.738 I/[Gralloc]( 2838): alloc w[1218] h[946] format[1] usage[2816]
- 01-21 15:06:14.741 I/HwSecImmHelper(12545): mSecurityInputMethodService is null
- 01-21 15:06:14.743 I/[Gralloc]( 2838): alloc succ handle[0x5595e61370] stride[1248]
- 01-21 15:06:14.744 I/[Gralloc]( 2838): alloc w[1218] h[946] format[1] usage[2816]
- 01-21 15:06:14.747 I/[Gralloc]( 2838): alloc succ handle[0x5595e61540] stride[1248]
- 01-21 15:06:14.747 I/[Gralloc]( 2838): alloc w[1218] h[946] format[1] usage[2816]
- 01-21 15:06:14.751 I/[Gralloc]( 2838): alloc succ handle[0x5595ea8000] stride[1248]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement