At the end of July, it was reported that , 95% of Android devices are vulnerable , which theoretically can be used to infect smartphones viruses through MMS. Moreover, , the user is not even necessary to open the MMS-message , and the message on some models can be removed after infection.
As it turned out later, , overflow vulnerability based on an integer variable in the library libStageFright OS Android for multimedia -file ( for example , videos mp4) with the possibility of recording in the memory , called « a bunch” that , theoretically , allows you to control the order of execution of code on the device. The vulnerability can be exploited not only by MMS , but also in any other way , in which the system library will start parsing the header of the video file – through special references or local applications.
And , eight days after a widely publicized problems with MMS , on the background of the conference taking place in Las Vegas Black Hat , from the black hole Google followed unexpectedly massive response – Google Nexus device is now over three years since its launch will receive monthly updates to address vulnerabilities ( security updates).
The first update , just eliminate a vulnerability in libStageFright , will start to come to the unit today – it will have only the owners of Nexus 4 , Nexus 5 , Nexus 6 , Nexus 7 , Nexus 9 , Nexus 10 , and Nexus Player.
Most of the same devices on Android , apparently , will not receive the update never (, see. share Android version to understand the level renewability).
No comments:
Post a Comment