Translation from English

Friday, August 14, 2015

endgadget- "Stagefright Flaw" on Android Resists Fixing

Fixing 'Stagefright' flaw on Android is harder than we thought

The Stagefright vulnerability for Android won't seem to want to go away. According toExodus Intelligence researchers one of the patched issued by Google could still allow access to Android devices. The researchers told Engadget via email, "the summary is that the Stagefright vulnerability is still exploitable and the 4-line patch that was implemented is faulty. We have been able to trigger the fault that still affects over 950 million Android devices." The issue with the patch was reported to Google which open sourced the patch for the patch this morning.
Google told Engadget,"currently over 90% of Android devices have a technology called ASLR enabled, which protects users from this issue. We've already sent the fix to our partners to protect users, and Nexus 4/5/6/7/9/10 and Nexus Player will get the OTA update in the September monthly security update."
Of course, like with all things Android, outside of the Nexus line, it's a wait and see situation when it comes to updates from phone makers. Hopefully they'll be hitting phones and tablets in the near future. But with only six days notice, Exodus Intelligence didn't give Google or its partners much time to get the patch ready.
Traditionally, researchers give companies 30 days notice about a security issue. This gives both parties adequate time to work on a patch and share information. In the post about the patch issue, the researchers explained that it decided to forgo the usual 30 days because the original issue was reported over 120 days ago, Google was still issuing the faulty patch and the amount of attention the original vulnerability had attracted.
So keep on the lookout for this new patch to fix the old patch.
119 people listening
phillip_drummond

mrbo
mrbo
It's a nice click bait headline, but at least buried in the article (which half the people here probably won't bother reading) is a blurb that really matters, which is that this isn't even an issue thanks to Address Space Layout Randomization (ASLR).  Anyone who knows even a tiny bit about programming understands how this technique makes buffer overrun attacks (such as exploiting the Stagefright bug) nearly impossible.
YYZ
YYZ
@mrbo: Nice to see Google bragging about ASLR, something they were late to the game with, and only did a half-assed version the first time (in ICS) and never really implemented it properly until JB.

No comments:

Post a Comment

Please leave a comment-- or suggestions, particularly of topics and places you'd like to see covered