Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Android security on the ropes with one-two punch from researchers


  • Please log in to reply
No replies to this topic

#1 NickAu

NickAu

    Bleepin' Fish Doctor


  • Moderator
  • 11,786 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:127.0.0.1 Australia
  • Local time:07:17 AM

Posted 13 August 2015 - 05:27 PM

 

Android security woes got worse on Thursday, with two separate reports of code defects that put millions of end users at risk.

The first involves the update Google released last week fixing a flaw that allowed attackers to execute malicious code on an estimated 950 million phones with nothing more than a maliciously crafted text message. Seven days later, security researchers are reporting that the patch, which has been in Google's possession since April, is so flawed that attackers can exploit the vulnerability anyway.

"The patch is 4 lines of code and was (presumably) reviewed by Google engineers prior to shipping," Jordan Gruskovnjak and Aaron Portnoy, who are researchers with security firm Exodus Intelligence, wrote in a blog post published Thursday. "The public at large believes the current patch protects them when it in fact does not."

The code-execution vulnerability is the result of a buffer overflow bug in Stagefright, a code library that processes video. Last week's patch, which was submitted by the researcher who discovered the flaw and privately reported it to Google in April, closed some but not all exploits. Specifically, booby-trapped MP4 videos that supplied variables with 64-bit lengths were able to overflow the buffer and feed malicious code into Android memory. Typically, MP4 videos work with 32-bit variable lengths, but the Exodus researchers found rare cases where 64-bit lengths can be used.

http://arstechnica.com/security/2015/08/android-security-on-the-ropes-with-one-two-punch-from-researchers/



BC AdBot (Login to Remove)

 


m



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users