• Skip to secondary menu
  • Skip to content
  • Skip to primary sidebar
  • Skip to footer

Central Toronto Real Estate - Max Seal Blog

Central Toronto Real Estate, Toronto Real Estate, Toronto Homes For Sale, Search toronto homes for sale, Max Seal, Broker, iPro Realty Ltd

  • Central Toronto Real Estate – Max Seal Blog
  • Home
    • About
  • Toronto Home Evaluation
  • Central Toronto Real Estate Blog
  • Contact Max
  • Search Toronto MLS
  • Toronto Real Estate Posts
  • FSBO Expired Listing Seller Free CMA
  • Seller
  • Buyer
  • Privacy Policy

‘Millions’ of Android mobes vulnerable to new Stagefright exploit

August 14, 2021 by Central Toronto Real Estate Blog

Image 22 'Millions' of Android mobes vulnerable to new Stagefright exploit - Screenshot - 19_03_2016

 

A group of Israeli researchers reckon they’ve cracked the challenge of crafting a reliable exploit for the Stagefright vulnerability that emerged in Android last year.

In a paper [PDF] that’s a cookbook on how to build the exploit for yourself, they suggest millions of unpatched Android devices are vulnerable to their design, which bypasses Android’s security defenses. Visiting a hacker’s webpage is enough to trigger a system compromise, we’re told.

Since no hot piece of infosec action exists without a name these days, the paper, written by Hanan Be’er of North-Bit, dubs the implementation of the Stagefright exploit “Metaphor.”

 

Stagefright is the name of a software library used by Android to parse videos and other media; it can be exploited by a booby-trapped message or webpage to execute malicious code on vulnerable devices.

The paper describes a three-step process to reliably hijacking an Android device:

The victim surfs to a malicious webpage that sends over a video file that crashes the operating system’s mediaserver software to reset its internal state. Some JavaScript on the page waits for mediaserver to restart, and then sends information about the device over the internet to the attacker’s private server.

This server then generates a custom video file that is sent to the device, which exploits Stagefright to reveal more information about the device’s internal state. This information is beamed back by the JavaScript to the attacker’s server, which uses the data to craft another video file that, when processed by Stagefright, starts executing a payload of malware embedded within the file on the victim’s handheld. This code runs with all the privileges it needs to spy on the device’s owner.

 

While North-Bit reckons its exploit design is reliable, you’ll have to, as described above, do some server-side work to deploy Metaphor.

In particular, you need to gather information about where libc.so and libicui8n.so are loaded in memory, and the jemalloc configuration in the device. This is why the aforementioned JavaScript phones home data about a victim’s device so the exploit can be tailored to attack the memory structures and firmware in that particular handset.

The exploit also needs a perform a heap spray to work, and that means the attacker may need to attempt exploitation multiple times on the target.

However, North-Bit says that with “further research it may be possible to lay aside all or some of the lookup tables” used to generate custom malicious video files – and that would lay the groundwork for a generic exploit.

 

The exploit specifically attacks the CVE-2015-3864 bug in a “fast, reliable and stealthy” way that bypasses ASLR – aka address space layout randomization, a mechanism that thwarts a lot of exploit writers.

It’s also important to note that the victim doesn’t have to press play on a rigged MPEG4 video file, because the bug is triggered when the web browser simply fetches and parses the file upon first seeing it.

“It was claimed [the bug] was impractical to exploit in­ the ­wild, mainly due to the implementation of exploit mitigations in newer Android versions, specifically ASLR,” the paper states.

“The team here at North-Bit has built a working exploit affecting Android versions 2.2 ­to 4.0 and 5.0 to 5.1, while bypassing ASLR on versions 5.0 ­to 5.1 (as Android versions 2.2 to 4.0 do not implement ASLR).”

Google released security patches to kill Stagefright’s vulnerabilities, although not every Android phone and tablet can receive and install them: some manufacturers and network carriers were in no rush to update older models, leaving potentially millions of gadgets at the mercy of exploits like the one built by North-Bit.

 

Updated to add

A Google spokesman has been in touch to say: “Android devices with a security patch level of October 1, 2015 or greater are protected because of a fix we released for this issue (CVE-2015-3864) last year. As always, we appreciate the security community’s research efforts as they help further secure the Android ecosystem for everyone.”

Read the full post in The Register

 

Please follow and like us:
RSS
Follow by Email
Facebook
fb-share-icon
Twitter
Tweet
Pinterest
Pinterest
fb-share-icon
LinkedIn
Share
Totonto Market Evaluation Online

Easy Related Posts

10 Signs Your Computer Might Have a Malware Infection

10 Signs Your Computer Might Have a Malware Infection

  Our computer is like a member of our family, when it doesn’t “feel good” or ...read more

My Computer Has Been Hacked! What To Do Now

My Computer Has Been Hacked! What To Do Now

   10 Things You Need to Do After Being Hacked You opened an e-mail attachment ...read more

Education, Age Important in Post-recession Toronto

Education, Age Important in Post-recession Toronto

  Education level is one of the most important factors in determining success in the Toronto ...read more

Email Address Top 27 People Search Sites and Email Address Directories

Email Address Top 27 People Search Sites and Email Address Directories

Searching for people online? Looking for an email address? Look closer and find friends old ...read more

How to Set Up a New iPhone

How to Set Up a New iPhone

  Whether your new iPhone is your first or you've been using Apple's smartphone since 2007, ...read more

Why Even Bother Trying to Stay Private Online

Why Even Bother Trying to Stay Private Online

It's so difficult to keep your privacy anymore.  In fact, 59% of American web users have ...read more

Google and YouTube Track Your Every Step

Google and YouTube Track Your Every Step

    Whether you like it or not, Google, Facebook, and Bing track everything that you do ...read more

Gmail Things You Didn't Know Gmail Did

Gmail Things You Didn't Know Gmail Did

  Gmail is really useful. It's free without feeling cheap. It doesn't add ads to the ...read more

How to get hundreds of paid Android apps and games for free

How to get hundreds of paid Android apps and games for free

  Android users, we don’t want you to feel neglected. We always try to help out ...read more

Filed Under: Toronto News Posts, Toronto Technology Posts Tagged With: android mobes, Stagefright exploit, toronto real estate, toronto technology

Primary Sidebar

Central Toronto Real Estate – Max Seal Blog

Max Seal, Broker,
Call 647-294-1177
Email: email to Max

iPro Realty Ltd. Brokerage
1396 Don Mills Rd, #101, Bldg E, Toronto, Ontario, M3B 3N1

Totonto Market Evaluation Online

TORONTO HOME EVALUATION ONLINE

Font Resizer

  • A A A

Call, text, email Max 647-294-1177

Call Max Seal at 647-294-1177 if you are thinking to sell your upscale or average home in Central Toronto communities like Bedford Park, York Mills, Lawrence Park, Forest Hill, Davisville, Summerhill, Yorkville, Annex, Rosedale,  Leaside and Don Mills.  Please click the link for a FREE Home Evaluation. No obligation.

Search Blog Posts

Recent Posts

  • Happy New Year 2025
  • Central Toronto Real Estate TRREB Released July, 2023 Resale Market Figures
  • Central Toronto Real Estate TRREB Released April, 2023 Resale Market Figures
  • Central Toronto Real Estate TRREB Released March, 2023 Resale Market Figures
  • Central Toronto Real Estate TRREB Released February, 2023 Resale Market Figures

Recent Comments

  • Central Toronto Real Estate Blog on 7 Great Hamstring Stretches
  • lee on 7 Great Hamstring Stretches
  • Enrique Pasion on Stop Worrying Using This Simple Brain Hack
  • Joefine on Easy Weight Loss Workouts for Beginners in Toronto
  • Rumiel Daymiel on Easy Weight Loss Workouts for Beginners in Toronto

Pages

  • Central Toronto Real Estate – Max Seal Blog
  • Home
    • About
  • Toronto Home Evaluation
  • Contact Max
  • Central Toronto Real Estate Blog
  • Search Toronto MLS
  • Toronto Real Estate Posts
  • FSBO Expired Listing Seller Free CMA
  • Seller
  • Buyer
  • Privacy Policy
Totonto Market Evaluation Online

TORONTO HOME EVALUATION ONLINE

Categories

Archives

Calendar

May 2025
S M T W T F S
 123
45678910
11121314151617
18192021222324
25262728293031
« Dec