An Technology blog focusing on portable devices. I have a news Blog @
. I have a Culture, Politic and Religion Blog @ Opinionand my domain is @ Armwood.Com.
I have a Jazz Blog @ Jazz. I have a Law Blog @ Law.
Built on tens of gigabytes of source code from the Android Open Source Project (AOSP), the leading smartphone operating system carries a scary code in its heart. Named Stagefright, it is a media library that processes several popular media formats. Since media processing is often time-sensitive, the library is implemented in native code (C++) that is more prone to memory corruption than memory-safe languages like Java.
Zimperium zLabs VP of Platform Research and Exploitation, Joshua J. Drake (@jduck), dived into the deepest corners of Android code and discovered what we believe to be the worst Android vulnerabilities discovered to date. These issues in Stagefright code critically expose 95% of Android devices, an estimated 950 million devices. Drake’s research, to be presented at Black Hat USA on August 5 and DEF CON 23 on August 7 found multiple remote code execution vulnerabilities that can be exploited using various methods, the worst of which requires no user-interaction.
- See more at: http://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/#sthash.Y48se8On.dpuf