about_average
Literotica Guru
- Joined
- Feb 19, 2011
- Posts
- 11,430
http://arstechnica.com/security/201...hones-are-vulnerable-to-new-stagefright-bugs/Stagefright 2.0, as it's being dubbed by researchers from security firm Zimperium, is a set of two bugs that are triggered when processing specially designed MP3 audio or MP4 video files. The first flaw, which is found in the libutils library and is indexed as CVE-2015-6602, resides in every Android version since 1.0, which was released in 2008. The vulnerability can be exploited even on newer devices with beefed up defenses by exploiting a second vulnerability in libstagefright, a code library Android uses to process media files. Google still hasn't issued a CVE index number for this second bug.
When combined, the flaws allow attackers to used booby-trapped audio or video files to execute malicious code on phones running Android 5.0 or later. Devices running 5.0 or earlier can be similarly exploited when they use the vulnerable function inside libutils, a condition that depends on what third-party apps are installed and what functionality came preloaded on the phone. In a blog post published Thursday, Zimperium researchers wrote:
And probably only 10%, at most, will get the fix, because of how Google, OEM's and providers work together. If you can call it working together.
http://arstechnica.com/gadgets/2015/08/waiting-for-androids-inevitable-security-armageddon/