By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Okay News
  • News
  • Entertainment
  • Business & Economy
  • Sport
  • Tech
Font ResizerAa
Okay NewsOkay News
Search
  • News
  • Entertainment
  • Business & Economy
  • Sport
  • Tech
Follow US
Tech

Another Critical Vulnerability Puts All Android Users At Risk. (Details)

Damilola A.
By
Damilola A.
ByDamilola A.
Entertainment News Reporter
Damilola is a dedicated entertainment writer for Okay Nigeria (Okay.ng). He joined the platform with the aim of using his experience in the Entertainment industry to...
Follow:
Published: 2015/08/20
2 Min Read
Share
SHARE

android_vulnerability_1
Another day, another Android vulnerability. A new security flaw has been found in the mediaserver component of Google’s mobile operating system, the same component that gave rise to the Stagefright bug. The vulnerability in question lies in the way Android handles media files, and if exploited, could allow an attacker to execute arbitrary codes. The vulnerability affects the vast majority of Android devices, running on version 2.3 to 5.1.1. Google has already published a fix for it to the AOSP program, though due to heavy fragmentation in the ecosystem, it could take a while before hitting your device.

Called CVE-2015-3842, the vulnerability has been found in the AudioEffect component of Android’s mediaserver component. The vulnerability, as reported by security firm TrendMicro, lies in the implementation of this feature which does not properly check for buffer sizes supplied by clients. An attacker can abuse this vulnerability by convincing users to install apps that don’t require any special permissions, and afterwards run arbitiary code on their devices.

“It uses an unchecked variable which comes from the client, which is usually an app. For an attack to begin, attackers convince the victim to install an app that doesn’t require any required permissions, giving them a false sense of security,”wrote Trend Micro in a blog post.

Among the things that could happen in the aftermath of the attack include compromised control of the camera, improper rendering of mp4 files, tweaks in privacy settings – essentially the tasks that are linked to the mediaserver component.

The comforting part of the news is that there are no known active exploits based on this vulnerability – and Google has already published a fix for it. Though, when will you receive this update on your device depends on the OEM. Trend Micro claims users can download its mobile security suite TMSS to be able to detect any threats trying to use the vulnerability.

TAGGED:Android Flaws
Share This Article
Facebook Pinterest Whatsapp Whatsapp Email Print
ByDamilola A.
Entertainment News Reporter
Follow:
Damilola is a dedicated entertainment writer for Okay Nigeria (Okay.ng). He joined the platform with the aim of using his experience in the Entertainment industry to share wonderful articles in this field. Dammy is a die-hard fan of Wizkid.
Previous Article UNILAG Releases Post-UTME 2015 Result
Next Article PHOTO: Checkout The Next Yet To Be Released Blackberry Android.

Stay Connected

FacebookLike
XFollow
InstagramFollow
TiktokFollow
WhatsAppFollow

You Might Also Like

Nigerian Communications Commission (NCC)
Tech

NCC Emerges Among Top Three Federal Agencies for Website Performance in 2025

By
Yusuf Abubakar
5 Min Read
Artificial intelligence (AI)International

Authors Sue Meta, OpenAI, xAI, Others Over Alleged Piracy of Books

By
Adamu Abubakar Isa
2 Min Read
TikTok
Tech

TikTok Shop Introduces Digital Gift Cards as It Pushes Deeper Into Online Shopping

By
Adamu Abubakar Isa
2 Min Read
Okay NewsOkay News
© Okay International Limited - All rights reserved
  • About Us
  • Advertising
  • Contact
  • Careers
  • Team
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Continue with Facebook
Not a member? Sign Up