Stagefright bug 2.0

Status
Not open for further replies.

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
1
23,394
3,488
More than 1 Billion Android devices are vulnerable to hackers once again – Thanks to newly disclosed two new Android Stagefright vulnerabilities.
Yes, Android Stagefright bug is Back…
…and this time, the flaw allows an attacker to hack Android smartphones just by tricking users into visiting a website that contains a malicious multimedia file, either MP3 or MP4.
In July, Joshua Drake, a Security researcher at Zimperium revealed the first Stagefright bug that allowed hackers to hijack Android smartphoneswith just a simple text message (exploit code).
How Stagefright Bug 2.0 Works
Both newly discovered vulnerabilities (CVE-2015-6602 and CVE-2015-3876) also reside in the Android Media Playback Engine called 'Stagefright' and affects all Android OS version from 1 to latest release 5.1.1.
Reportedly, merely previewing a maliciously crafted song or video file would execute theStagefright Bug 2.0 exploit, allowing hackers to run remote codes on the victim's Android device.
New Stagefright Attack Vectors
The Stagefright Bug 2.0 vulnerability can be triggered (attack vectors) by:

  • Webpage
  • Man-in-the-middle attack
  • Third-party media player
  • Instant messaging apps
"Additionally, the attacker gains a foothold, from which they could conduct further local privilege escalation attacks and take complete control of the device,"Zimperium said.
..more on the link above and on
Zimperium zLabs is Raising the Volume: New Vulnerability Processing MP3/MP4 Media.


Android security updates once a month? Are they kidding?:mad:
I think they all need a class action to get to an ASAP schedule...
 
Last edited:
Last edited:
  • Like
Reactions: Moose
Status
Not open for further replies.