The Android security problem known as Stagefright is back, in a new and just-as-worrying form.
The original Stagefright issue, which has has been causing concern for months, exploited a weakness in the Android media handler, allowing hackers to execute code through videos embedded in MMS messages. Now, a similar vulnerability has been discovered for audio files.
Stagefright could affect a billion devices, most particularly those running Android Jelly Bean or earlier.
The good news is that Google has clarified that, ever since Android 4.0 Ice Cream Sandwich, a technology known as Address Space Layout Randomizing (ASLR) has been a part of Android. ASLR supposedly protects users from the Stagefright attack method because the RAM an app uses is never the same.
But the process is not perfect and nefarious attempts to circumvent ASLR are apparently already underway. Researchers have already demonstrated how Stagefright can be triggered via apps or even URLs. Fortunately those avenues require the user to manually retrieve the video, unlike MMS, which is retrieved automatically.
ALL CREDITS/READ MORE@ANDROIDPIT
RELATED TAGS YOU MAY LIKE |
Android News
REVIEWS | COMMENTS