Thursday, October 1, 2015 12:39 pm > 9k
Continue to follow up reports of vulnerabilities in Android and more Recent gives failure to account on how the operating system handles MP3 and MP4 files, which allows the execution of malicious code from websites
. According to investigators the Zimperium, the problem arises when any app uses the Media libraries Android to preview these audio or video content, and recalls the problem also detected by Zimperium in libraria Stagefright.
The vulnerability, this time located in “libutils” and affects all Android versions prior to Android 5.0, but can be exploited in Android latest Lollipop, traveled together with a new bug in Stagefright
.
The good news is that the scanning vector via MMS has been corrected after the knowledge of Stagefright vulnerability, but the bad news say now just take the user to have to click on malicious links in emails or malicious advertisements on legitimate sites, and hackers able to intercept communications on open networks can inject code directly in traffic
. Finally, multimedia apps that make use of the libutils to read metadata about media files, too could be explored
.
The solution
Google is informed of vulnerabilities, which received the CVE-2015-3876 and CVE-2015-6602 codes, and will release a fix start on Saturday 05 October, and has shared solutions to manufacturers smartphone
. The whole thing may not end up here because following the first major vulnerability found in Stagefright, the attentions of hackers and security companies concentrated if in multimedia libraries of the Android system and various problems have been reported, although variable dimension. It is therefore expected that new vulnerabilities can still be found
.