googles researchers bypass android feature that should have blocked stagefright
Last Updated : GMT 09:40:38
Themuslimchronicle, themuslimchronicle
Themuslimchronicle, themuslimchronicle
Last Updated : GMT 09:40:38
Themuslimchronicle, themuslimchronicle

Google's researchers bypass Android feature that should have blocked Stagefright

Themuslimchronicle, themuslimchronicle

Themuslimchronicle, themuslimchronicleGoogle's researchers bypass Android feature that should have blocked Stagefright

​Google's Project Zero
Tehran - FNA

Google's Project Zero security researchers challenged the claim by Google that an Android security feature would have protected 90 percent of devices from Stagefright attacks.

Google's security researchers have found that an anti-exploitation feature in Android that should block Stagefright-based attacks can be bypassed.

In the aftermath of the Stagefright bug, Google told media that 90 percent of Android devices would have been protected from an attack using the bug because Google had implemented address space layout randomisation (ASLR) in Android. Google introduced ASLR to Android in 2012 with version 4.1, ZDnet reported.

Google made the point as neither it, nor other Android OEMs, had released Stagefright patches for some time - some were only delivered two months after the news of the bug came to light.

ASLR is implemented in most operating systems to make it more difficult for an attacker to, for example, exploit memory corruption weaknesses. Symantec describes ASLR as a "prophylactic security technology" that strengthens security by increasing the diversity of attack targets. It doesn't remove existing flaws, but will make them more difficult to exploit.

As Ars Technica noted, the problem with Google's claim that ASLR would have protected users from Stagefright is that it was only partly true. Google's own Project Zero security team -- which is tasked with finding holes in Google's and other vendors' software -- has devised brute force bypass for ASLR that would be practical in a real-world web attack, such as planting an exploit on an attack website.

"I did some extended testing on my Nexus 5; and results were pretty much as expected," wrote Mark Brand of Project Zero.

"In 4096 exploit attempts I got 15 successful callbacks; the shortest time-to-successful-exploit was lucky, at around 30 seconds, and the longest was over an hour. Given that the mediaserver process is throttled to launching once every 5 seconds, and the chance of success is 1/256 per attempt, this gives us a ~4% chance of a successful exploit each minute," he added.

Describing the ASLR bypass itself, Brand noted: "We simply choose one of the 256 possible base addresses for libc.so, and write our exploit and ROP stack assuming that layout. Launching the exploit from the browser, we use javascript to keep refreshing the page, and wait for a callback. Eventually memory will be laid out as we expect, bypassing ASLR with brute force in a practical enough way for real-world exploitation."

Despite this, Brand noted that would be trivial to exploit the Stagefright bugs if ASLR was disabled.

Project Zero has provided the Android security team advice on how to harden ASLR to prevent bypasses, but Brand noted that even with these they won't prove non-exploitability of future memory corruption bugs on Android devices.

themuslimchronicle
themuslimchronicle

Name *

E-mail *

Comment Title*

Comment *

: Characters Left

Mandatory *

Terms of use

Publishing Terms: Not to offend the author, or to persons or sanctities or attacking religions or divine self. And stay away from sectarian and racial incitement and insults.

I agree with the Terms of Use

Security Code*

googles researchers bypass android feature that should have blocked stagefright googles researchers bypass android feature that should have blocked stagefright

 



Themuslimchronicle, themuslimchronicle
Themuslimchronicle, themuslimchronicle
Themuslimchronicle, themuslimchronicle

GMT 20:10 2017 Saturday ,09 September

Qatar News Agency continues to distort facts

GMT 01:33 2017 Sunday ,12 February

MBRSC and AUS announce launch of Nayif

GMT 16:44 2017 Wednesday ,11 October

New military op in gang-plagued Rio favela

GMT 07:42 2017 Sunday ,03 September

Venezuela probes wife of opposition activist

GMT 00:44 2017 Sunday ,19 March

Federal Prosecution for cybercrimes established

GMT 20:54 2017 Thursday ,20 April

Dollar exchange rate stable at major banks in Egypt

GMT 19:11 2017 Sunday ,29 October

US Fed to stand pat as inflation conundrum persists

GMT 14:30 2017 Tuesday ,04 July

Beaten Pacquiao to 'think hard' about retiring

GMT 13:58 2017 Tuesday ,19 September

Balance Festival appoints Hope & Glory PR

GMT 16:23 2015 Friday ,25 September

'Super blood moon' to give stargazers a rare show

GMT 13:22 2017 Wednesday ,30 August

Looking stylish and playing well always fashionable
Themuslimchronicle, themuslimchronicle
Themuslimchronicle, themuslimchronicle
 
 Themuslimchronicle Facebook,themuslimchronicle facebook  Themuslimchronicle Twitter,themuslimchronicle twitter Themuslimchronicle Rss,themuslimchronicle rss  Themuslimchronicle Youtube,themuslimchronicle youtube  Themuslimchronicle Youtube,themuslimchronicle youtube

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

Maintained and developed by Arabs Today Group SAL.
All rights reserved to Arab Today Media Group 2025 ©

muslimchronicle muslimchronicle muslimchronicle muslimchronicle
themuslimchronicle themuslimchronicle themuslimchronicle
themuslimchronicle
بناية النخيل - رأس النبع _ خلف السفارة الفرنسية _بيروت - لبنان
themuslimchronicle, themuslimchronicle, themuslimchronicle