Stagefright gap threatens 95% of Android devices



A group of researchers discovered  in Zimperium zLabs company serious security flaw in the Android system allow the breach of the machine and control it remotely through a malicious MMS multimedia messages, called this gap Stagefright name.

The researchers stressed that the gap threatens 95 percent of smart devices operating Android operating system, which is found in one of the media libraries on which the operating system to display file formats and read, which infect the operating hardware version 2.2 or later, which means it threatens about 950 million device.

Google and Samsung started  to send security updates to resolve this gap, but it gradually up to the users, according to the latest reports that LG joined Google, Samsung and pledged to send security updates on a monthly basis for all users of its organs operating system Android after the discovery of a loophole Stagefright.

Google explained that the Nexus devices that will get the security updates on a monthly basis is the Nexus 4, 5, 6, 7, 9 and 10 in addition to the Nexus Player device. The company also will be given major updates to Nexus devices for two years, and security updates for a period of 3 years from the date provided by or for a period of 18 months since the purchase through the Google Play store.

In contrast, Samsung did not mention the devices that will be covered by the program, saying only through the official blog: "This program is in collaboration with the service providers and partners, and that more details will be announced at a later date."

In the case of non-arrival of the update officially can go to the messaging application Settings Settings, and then search for disabled MMS Disable MMS option, in which case the user will not receive multimedia messages in full, but the only solution until the arrival of the security update to the device, which can then re-activation messages.

It should be noted that Stagefright of non-traditional security holes, where could otherwise be used for after the download of malicious software on machines without any contact with its users, and without having to deal directly with the device, and how you make sure of the possibility of a breakthrough Android device using a loophole Stagefright.

No comments:

Post a Comment