TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Android crypto key theft vulnerability affects 86% of devices

37 pointsby Titanbasealmost 11 years ago

2 comments

userbinatoralmost 11 years ago
One of the first comments there with the partial ARM opcode map shows why this vulnerability is &quot;theoretical&quot; - you can overflow the buffer, but the bytes written to the buffer are restricted so much (values will always be between 43 and 126) that it would be nearly impossible to write useful exploit code.<p>The details are here:<p><a href="http://securityintelligence.com/android-keystore-stack-buffer-overflow-to-keep-things-simple-buffers-are-always-larger-than-needed/" rel="nofollow">http:&#x2F;&#x2F;securityintelligence.com&#x2F;android-keystore-stack-buffe...</a>
评论 #7961374 未加载
MBCookalmost 11 years ago
The sad thing is how many of these devices, despite being only a year or two old, may only get patched much later or never.<p>I find it interesting that Google is forcing the ability to update [1] Android watches, cars, and TV boxes by limiting OEM customization. I guess the carrot approach hasn&#x27;t been working well enough to convince OEMs.<p>[1] <a href="http://arstechnica.com/gadgets/2014/06/android-wear-auto-and-tv-save-you-from-skins-and-oems-from-themselves/" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;gadgets&#x2F;2014&#x2F;06&#x2F;android-wear-auto-and...</a>
评论 #7960041 未加载
评论 #7959926 未加载
评论 #7960502 未加载