Advertisement
Guest User

Huawei P8 running Android 6.0 logcat after VTS 1.3 run

a guest
Jan 21st, 2016
1,208
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 27.97 KB | None | 0 0
  1. 01-21 15:06:10.078 W/View ( 3706): requestLayout() improperly called by com.android.systemui.statusbar.phone.IconMerger{cb60a46 V.E...... ......I. 0,0-108,72 #7f0f00c7 app:id/notificationIcons} during layout: running second layout pass
  2. 01-21 15:06:11.140 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie]
  3. 01-21 15:06:11.140 I/System.out(12545): null
  4. 01-21 15:06:11.140 I/System.out(12545): null
  5. 01-21 15:06:11.143 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright MethodName:exec
  6. 01-21 15:06:11.267 W/View ( 3706): requestLayout() improperly called by com.android.systemui.statusbar.phone.IconMerger{cb60a46 V.E...... ........ 0,0-108,72 #7f0f00c7 app:id/notificationIcons} during second layout pass: posting in next frame
  7. 01-21 15:06:11.282 I/[Gralloc]( 2838): alloc w[1218] h[891] format[1] usage[2816]
  8. 01-21 15:06:11.285 I/[Gralloc]( 2838): alloc succ handle[0x5595ec1f20] stride[1248]
  9. 01-21 15:06:11.285 I/[Gralloc]( 2838): alloc w[1218] h[891] format[1] usage[2816]
  10. 01-21 15:06:11.288 I/[Gralloc]( 2838): alloc succ handle[0x559603a890] stride[1248]
  11. 01-21 15:06:11.288 I/[Gralloc]( 2838): alloc w[1218] h[891] format[1] usage[2816]
  12. 01-21 15:06:11.292 I/[Gralloc]( 2838): alloc succ handle[0x5595ee5220] stride[1248]
  13. 01-21 15:06:11.298 E/GraphicBuffer(12545): unflatten: numFds or numInts is too large: 4096, 4085
  14. 01-21 15:06:11.298 I/HwSecImmHelper(12545): mSecurityInputMethodService is null
  15. 01-21 15:06:11.304 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
  16. 01-21 15:06:11.304 I/System.out(12545): null
  17. 01-21 15:06:11.304 I/System.out(12545): null
  18. 01-21 15:06:11.304 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
  19. 01-21 15:06:11.339 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-1.mp4]
  20. 01-21 15:06:11.339 I/System.out(12545): null
  21. 01-21 15:06:11.339 I/System.out(12545): null
  22. 01-21 15:06:11.340 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
  23. 01-21 15:06:11.550 I/OMXClient(12601): Using client-side OMX mux.
  24. 01-21 15:06:11.573 I/FFMPEGExtractor(12601): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-1.mp4]
  25. 01-21 15:06:11.584 E/ffmpeg-avlog(12601): error reading header
  26. 01-21 15:06:11.584 E/FFMPEGExtractor(12601): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-1.mp4
  27. 01-21 15:06:11.584 W/MediaExtractor(12601): Delete extractor since no track find.
  28. 01-21 15:06:11.590 W/System.err(12545): java.lang.Exception: Test error
  29. 01-21 15:06:11.590 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
  30. 01-21 15:06:11.590 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
  31. 01-21 15:06:11.590 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
  32. 01-21 15:06:11.590 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
  33. 01-21 15:06:11.590 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
  34. 01-21 15:06:11.590 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
  35. 01-21 15:06:11.590 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
  36. 01-21 15:06:11.590 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
  37. 01-21 15:06:11.590 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
  38. 01-21 15:06:11.592 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
  39. 01-21 15:06:11.592 I/System.out(12545): null
  40. 01-21 15:06:11.592 I/System.out(12545): null
  41. 01-21 15:06:11.592 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
  42. 01-21 15:06:11.628 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-2.mp4]
  43. 01-21 15:06:11.628 I/System.out(12545): null
  44. 01-21 15:06:11.628 I/System.out(12545): null
  45. 01-21 15:06:11.629 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
  46. 01-21 15:06:11.887 I/OMXClient(12606): Using client-side OMX mux.
  47. 01-21 15:06:11.901 I/SampleTable(12606): There are reordered frames present.
  48. 01-21 15:06:11.901 I/FFMPEGExtractor(12606): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-2.mp4]
  49. 01-21 15:06:11.902 E/ffmpeg-avlog(12606): error reading header
  50. 01-21 15:06:11.902 E/FFMPEGExtractor(12606): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-2.mp4
  51. 01-21 15:06:11.902 W/MediaExtractor(12606): Delete extractor since no track find.
  52. 01-21 15:06:11.907 W/System.err(12545): java.lang.Exception: Test error
  53. 01-21 15:06:11.907 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
  54. 01-21 15:06:11.907 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
  55. 01-21 15:06:11.907 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
  56. 01-21 15:06:11.907 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
  57. 01-21 15:06:11.907 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
  58. 01-21 15:06:11.907 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
  59. 01-21 15:06:11.907 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
  60. 01-21 15:06:11.907 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
  61. 01-21 15:06:11.907 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
  62. 01-21 15:06:11.910 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
  63. 01-21 15:06:11.910 I/System.out(12545): null
  64. 01-21 15:06:11.911 I/System.out(12545): null
  65. 01-21 15:06:11.911 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
  66. 01-21 15:06:11.950 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-3.mp4]
  67. 01-21 15:06:11.950 I/System.out(12545): null
  68. 01-21 15:06:11.950 I/System.out(12545): null
  69. 01-21 15:06:11.950 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
  70. 01-21 15:06:12.201 I/OMXClient(12609): Using client-side OMX mux.
  71. 01-21 15:06:12.212 I/FFMPEGExtractor(12609): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-3.mp4]
  72. 01-21 15:06:12.213 E/ffmpeg-avlog(12609): error reading header
  73. 01-21 15:06:12.213 E/FFMPEGExtractor(12609): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-3.mp4
  74. 01-21 15:06:12.213 W/MediaExtractor(12609): Delete extractor since no track find.
  75. 01-21 15:06:12.217 W/System.err(12545): java.lang.Exception: Test error
  76. 01-21 15:06:12.217 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
  77. 01-21 15:06:12.217 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
  78. 01-21 15:06:12.217 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
  79. 01-21 15:06:12.217 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
  80. 01-21 15:06:12.217 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
  81. 01-21 15:06:12.217 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
  82. 01-21 15:06:12.217 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
  83. 01-21 15:06:12.217 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
  84. 01-21 15:06:12.217 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
  85. 01-21 15:06:12.220 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
  86. 01-21 15:06:12.220 I/System.out(12545): null
  87. 01-21 15:06:12.220 I/System.out(12545): null
  88. 01-21 15:06:12.220 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
  89. 01-21 15:06:12.255 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-4.mp4]
  90. 01-21 15:06:12.255 I/System.out(12545): null
  91. 01-21 15:06:12.255 I/System.out(12545): null
  92. 01-21 15:06:12.255 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
  93. 01-21 15:06:12.468 I/OMXClient(12615): Using client-side OMX mux.
  94. 01-21 15:06:12.483 I/FFMPEGExtractor(12615): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-4.mp4]
  95. 01-21 15:06:12.485 E/ffmpeg-avlog(12615): error reading header
  96. 01-21 15:06:12.485 E/FFMPEGExtractor(12615): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1538-4.mp4
  97. 01-21 15:06:12.485 W/MediaExtractor(12615): Delete extractor since no track find.
  98. 01-21 15:06:12.490 W/System.err(12545): java.lang.Exception: Test error
  99. 01-21 15:06:12.491 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
  100. 01-21 15:06:12.491 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
  101. 01-21 15:06:12.491 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
  102. 01-21 15:06:12.491 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
  103. 01-21 15:06:12.491 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
  104. 01-21 15:06:12.491 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
  105. 01-21 15:06:12.491 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
  106. 01-21 15:06:12.491 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
  107. 01-21 15:06:12.491 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
  108. 01-21 15:06:12.494 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
  109. 01-21 15:06:12.494 I/System.out(12545): null
  110. 01-21 15:06:12.494 I/System.out(12545): null
  111. 01-21 15:06:12.495 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
  112. 01-21 15:06:12.542 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1539.mp4]
  113. 01-21 15:06:12.542 I/System.out(12545): null
  114. 01-21 15:06:12.542 I/System.out(12545): null
  115. 01-21 15:06:12.543 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
  116. 01-21 15:06:12.754 I/OMXClient(12619): Using client-side OMX mux.
  117. 01-21 15:06:12.765 I/FFMPEGExtractor(12619): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1539.mp4]
  118. 01-21 15:06:12.766 E/ffmpeg-avlog(12619): moov atom not found
  119. 01-21 15:06:12.766 E/FFMPEGExtractor(12619): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-1539.mp4
  120. 01-21 15:06:12.766 W/MediaExtractor(12619): Delete extractor since no track find.
  121. 01-21 15:06:12.771 W/System.err(12545): java.lang.Exception: Test error
  122. 01-21 15:06:12.772 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
  123. 01-21 15:06:12.772 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
  124. 01-21 15:06:12.772 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
  125. 01-21 15:06:12.772 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
  126. 01-21 15:06:12.772 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
  127. 01-21 15:06:12.772 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
  128. 01-21 15:06:12.772 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
  129. 01-21 15:06:12.772 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
  130. 01-21 15:06:12.772 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
  131. 01-21 15:06:12.777 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
  132. 01-21 15:06:12.777 I/System.out(12545): null
  133. 01-21 15:06:12.777 I/System.out(12545): null
  134. 01-21 15:06:12.778 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
  135. 01-21 15:06:12.826 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3824.mp4]
  136. 01-21 15:06:12.826 I/System.out(12545): null
  137. 01-21 15:06:12.827 I/System.out(12545): null
  138. 01-21 15:06:12.827 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
  139. 01-21 15:06:13.068 I/OMXClient(12623): Using client-side OMX mux.
  140. 01-21 15:06:13.086 I/FFMPEGExtractor(12623): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3824.mp4]
  141. 01-21 15:06:13.087 E/FFMPEGExtractor(12623): Can not find video stream!
  142. 01-21 15:06:13.087 W/FFMPEGExtractor(12623): Can not find audio stream!
  143. 01-21 15:06:13.087 E/FFMPEGExtractor(12623): Couldn't find audio stream and video stream!
  144. 01-21 15:06:13.087 W/MediaExtractor(12623): Delete extractor since no track find.
  145. 01-21 15:06:13.093 W/System.err(12545): java.lang.Exception: Test error
  146. 01-21 15:06:13.094 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
  147. 01-21 15:06:13.094 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
  148. 01-21 15:06:13.094 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
  149. 01-21 15:06:13.094 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
  150. 01-21 15:06:13.094 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
  151. 01-21 15:06:13.094 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
  152. 01-21 15:06:13.094 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
  153. 01-21 15:06:13.094 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
  154. 01-21 15:06:13.094 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
  155. 01-21 15:06:13.099 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
  156. 01-21 15:06:13.099 I/System.out(12545): null
  157. 01-21 15:06:13.099 I/System.out(12545): null
  158. 01-21 15:06:13.100 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
  159. 01-21 15:06:13.148 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3828.mp4]
  160. 01-21 15:06:13.149 I/System.out(12545): null
  161. 01-21 15:06:13.149 I/System.out(12545): null
  162. 01-21 15:06:13.149 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
  163. 01-21 15:06:13.418 I/OMXClient(12627): Using client-side OMX mux.
  164. 01-21 15:06:13.436 I/FFMPEGExtractor(12627): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3828.mp4]
  165. 01-21 15:06:13.436 E/FFMPEGExtractor(12627): FFmpeg can not find the streams or codec!
  166. 01-21 15:06:13.436 W/MediaExtractor(12627): Delete extractor since no track find.
  167. 01-21 15:06:13.441 W/System.err(12545): java.lang.Exception: Test error
  168. 01-21 15:06:13.441 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
  169. 01-21 15:06:13.441 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
  170. 01-21 15:06:13.441 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
  171. 01-21 15:06:13.441 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
  172. 01-21 15:06:13.441 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
  173. 01-21 15:06:13.441 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
  174. 01-21 15:06:13.441 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
  175. 01-21 15:06:13.441 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
  176. 01-21 15:06:13.441 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
  177. 01-21 15:06:13.443 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
  178. 01-21 15:06:13.443 I/System.out(12545): null
  179. 01-21 15:06:13.443 I/System.out(12545): null
  180. 01-21 15:06:13.444 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
  181. 01-21 15:06:13.476 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3829.mp4]
  182. 01-21 15:06:13.476 I/System.out(12545): null
  183. 01-21 15:06:13.476 I/System.out(12545): null
  184. 01-21 15:06:13.477 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
  185. 01-21 15:06:13.719 I/OMXClient(12633): Using client-side OMX mux.
  186. 01-21 15:06:13.731 I/FFMPEGExtractor(12633): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3829.mp4]
  187. 01-21 15:06:13.732 E/ffmpeg-avlog(12633): moov atom not found
  188. 01-21 15:06:13.732 E/FFMPEGExtractor(12633): FFMPEGExtractor Failed open file : file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3829.mp4
  189. 01-21 15:06:13.732 W/MediaExtractor(12633): Delete extractor since no track find.
  190. 01-21 15:06:13.737 W/System.err(12545): java.lang.Exception: Test error
  191. 01-21 15:06:13.737 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
  192. 01-21 15:06:13.737 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
  193. 01-21 15:06:13.738 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
  194. 01-21 15:06:13.738 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
  195. 01-21 15:06:13.738 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
  196. 01-21 15:06:13.738 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
  197. 01-21 15:06:13.738 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
  198. 01-21 15:06:13.738 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
  199. 01-21 15:06:13.738 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
  200. 01-21 15:06:13.743 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
  201. 01-21 15:06:13.743 I/System.out(12545): null
  202. 01-21 15:06:13.743 I/System.out(12545): null
  203. 01-21 15:06:13.744 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
  204. 01-21 15:06:13.797 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3864.mp4]
  205. 01-21 15:06:13.797 I/System.out(12545): null
  206. 01-21 15:06:13.797 I/System.out(12545): null
  207. 01-21 15:06:13.797 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
  208. 01-21 15:06:14.060 I/OMXClient(12638): Using client-side OMX mux.
  209. 01-21 15:06:14.075 I/FFMPEGExtractor(12638): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/CVE-2015-3864.mp4]
  210. 01-21 15:06:14.076 E/FFMPEGExtractor(12638): Can not find video stream!
  211. 01-21 15:06:14.077 W/FFMPEGExtractor(12638): Can not find audio stream!
  212. 01-21 15:06:14.077 E/FFMPEGExtractor(12638): Couldn't find audio stream and video stream!
  213. 01-21 15:06:14.077 W/MediaExtractor(12638): Delete extractor since no track find.
  214. 01-21 15:06:14.083 W/System.err(12545): java.lang.Exception: Test error
  215. 01-21 15:06:14.083 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
  216. 01-21 15:06:14.083 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
  217. 01-21 15:06:14.083 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
  218. 01-21 15:06:14.083 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
  219. 01-21 15:06:14.083 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
  220. 01-21 15:06:14.083 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
  221. 01-21 15:06:14.084 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
  222. 01-21 15:06:14.084 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
  223. 01-21 15:06:14.084 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
  224. 01-21 15:06:14.088 I/System.out(12545): [chmod, 700, /data/user/0/com.nowsecure.android.vts/files/crashCheck-pie]
  225. 01-21 15:06:14.088 I/System.out(12545): null
  226. 01-21 15:06:14.088 I/System.out(12545): null
  227. 01-21 15:06:14.089 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:extractCrashCheckBinary
  228. 01-21 15:06:14.132 I/System.out(12545): [/data/user/0/com.nowsecure.android.vts/files/crashCheck-pie, 5, /data/user/0/com.nowsecure.android.vts/files/stagefrightCheck-pie, /data/user/0/com.nowsecure.android.vts/files/stagefright_media/sf-itunes-poc.mp4]
  229. 01-21 15:06:14.132 I/System.out(12545): null
  230. 01-21 15:06:14.132 I/System.out(12545): null
  231. 01-21 15:06:14.132 I/System.out(12545): Calling by::className:fuzion24.device.vulnerability.vulnerabilities.helper.CrashCheck MethodName:execute
  232. 01-21 15:06:14.385 I/OMXClient(12642): Using client-side OMX mux.
  233. 01-21 15:06:14.407 I/FFMPEGExtractor(12642): FFMPEGExtractor opened file is [file://?FileDescriptor=6&Offset=0&Length=576460752303423487&Path=/data/data/com.nowsecure.android.vts/files/stagefright_media/sf-itunes-poc.mp4]
  234. 01-21 15:06:14.408 E/FFMPEGExtractor(12642): FFmpeg can not find the streams or codec!
  235. 01-21 15:06:14.408 W/MediaExtractor(12642): Delete extractor since no track find.
  236. 01-21 15:06:14.413 W/System.err(12545): java.lang.Exception: Test error
  237. 01-21 15:06:14.414 W/System.err(12545): at fuzion24.device.vulnerability.vulnerabilities.framework.media.StageFright$1.isVulnerable(StageFright.java:88)
  238. 01-21 15:06:14.414 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:58)
  239. 01-21 15:06:14.414 W/System.err(12545): at fuzion24.device.vulnerability.test.VulnerabilityTestRunner.doInBackground(VulnerabilityTestRunner.java:15)
  240. 01-21 15:06:14.414 W/System.err(12545): at android.os.AsyncTask$2.call(AsyncTask.java:307)
  241. 01-21 15:06:14.414 W/System.err(12545): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
  242. 01-21 15:06:14.414 W/System.err(12545): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:246)
  243. 01-21 15:06:14.414 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1113)
  244. 01-21 15:06:14.414 W/System.err(12545): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:588)
  245. 01-21 15:06:14.414 W/System.err(12545): at java.lang.Thread.run(Thread.java:833)
  246. 01-21 15:06:14.738 I/[Gralloc]( 2838): alloc w[1218] h[946] format[1] usage[2816]
  247. 01-21 15:06:14.741 I/HwSecImmHelper(12545): mSecurityInputMethodService is null
  248. 01-21 15:06:14.743 I/[Gralloc]( 2838): alloc succ handle[0x5595e61370] stride[1248]
  249. 01-21 15:06:14.744 I/[Gralloc]( 2838): alloc w[1218] h[946] format[1] usage[2816]
  250. 01-21 15:06:14.747 I/[Gralloc]( 2838): alloc succ handle[0x5595e61540] stride[1248]
  251. 01-21 15:06:14.747 I/[Gralloc]( 2838): alloc w[1218] h[946] format[1] usage[2816]
  252. 01-21 15:06:14.751 I/[Gralloc]( 2838): alloc succ handle[0x5595ea8000] stride[1248]
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement