TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Android libstagefright still exploitable

164 点作者 amatus将近 10 年前

19 条评论

stevenh将近 10 年前
Any competent malware developer must have already figured out how to exploit this the first time around. Now that every single one of those malware developers has learned it is still exploitable, the payload they&#x27;ve spent the past month perfecting can now be deployed in the wild.<p>So, can someone explain why a disastrous worm hasn&#x27;t already swept the globe and infected 99% of Android devices on the planet within ten minutes of being released in the wild?<p>1. Text payload to victim<p>2. Payload executes on victim&#x27;s phone and texts itself to all of the victim&#x27;s contacts<p>3. Repeat<p>Assuming the average Android phone owner has 20 contacts who also have Android phones, and assuming also that texting the payload to those 20 people would take two minutes to complete, the infection would spread exponentially and only take ten minutes for the initial text to result in the infection of 10 billion devices worldwide.<p>Why am I not currently being bombarded with MMS video texts from infected devices? It frankly seems a bit miraculous. Did Google set up an emergency arrangement with all of the carriers to block suspicious video texts so this wouldn&#x27;t happen?
评论 #10057428 未加载
评论 #10056549 未加载
评论 #10056804 未加载
评论 #10056346 未加载
评论 #10056355 未加载
评论 #10056807 未加载
评论 #10056353 未加载
评论 #10056467 未加载
评论 #10057035 未加载
评论 #10056377 未加载
jimrandomh将近 10 年前
Summary: A little over two weeks ago, it was publicly disclosed that MMS messages can cause Android phones to decode video with libstagefright, which is a C++ library with vulnerabilities and insufficient sandboxing, leading to remote code execution without user interaction. Today, Exodus Intelligence is reporting that the patch to fix one of these vulnerabilities does not, in fact, fix it. Thus, all Android phones are still vulnerable.<p>You can partially mitigate the risk by disabling auto-downloading of MMS messages in whichever app you have set to handle text messages, such as Messaging or Hangouts. If you have not done so already, this is urgent. Furthermore, you should assume that auto-downloading of MMS messages will not ever be safe, no matter how many individual security fixes are applied, until this component of Android is significantly re-architected.
评论 #10056102 未加载
评论 #10056081 未加载
hoopism将近 10 年前
Is this timeline correct?<p>April 2015 - Original stagefright exposed<p>July 31st - Author noticed patch was not sufficient but could not test (did not notify google)<p>August 6th - Patch released<p>August 7th - Author notified google that patch was not adequate<p>August 13th - Author went public?!?!<p>They are counting the original date of exploitation as the start date for notification. I would think a more responsible and friendly date would be August 7th. Just me.
评论 #10055940 未加载
评论 #10055997 未加载
评论 #10056972 未加载
评论 #10056337 未加载
archmikhail将近 10 年前
Even if Google patches this, there&#x27;s an incredible delay in getting the patch to users. Android in fundamentally flawed in this respect.<p><a href="http:&#x2F;&#x2F;www.extremetech.com&#x2F;mobile&#x2F;197346-google-throws-nearly-a-billion-android-users-under-the-bus-refuses-to-patch-os-vulnerability" rel="nofollow">http:&#x2F;&#x2F;www.extremetech.com&#x2F;mobile&#x2F;197346-google-throws-nearl...</a>
评论 #10056041 未加载
评论 #10056485 未加载
评论 #10056315 未加载
评论 #10055906 未加载
josh2600将近 10 年前
Did I read that right? They reported the bug to Google on August 7th and disclosed it publicly on August 13th?<p>Is this still responsible disclosure if they give Google basically 6 days to respond and use the original notification date as justification? I&#x27;m not learned enough in the practice of responsible disclosure to know if this is common, but I&#x27;ve not seen that before.
评论 #10055896 未加载
评论 #10055937 未加载
评论 #10055854 未加载
lnanek2将近 10 年前
Doesn&#x27;t seem very responsible behavior by the reporter. Google accepted the suggested patches, fixed the original cases. Now some other cases are discovered for these larger numbers, OK, that seems like a new thing to fix next. Not sure why I have to read paragraphs of hate when the company put the suggested patches in already. Seems like just an excuse so they can ride the page view wave.
评论 #10057271 未加载
captainmuon将近 10 年前
And I was wondering at the beginning of the article why they were doing<p><pre><code> if (SIZE_MAX - chunk_size &lt;= size) </code></pre> and not the more readable<p><pre><code> if (size + chunk_size &gt;= SIZE_MAX) </code></pre> Of course, C integer overflow. The real WTF is that this is possible in C.<p>What would be more sensible than integer overflow would be to automatically promote integers to a larger type in the context of a comparison, so that they don&#x27;t overflow. I wonder if you could add that to the language in a backwards-compatible way? Maybe add a new builtin (compiler-specific, but shared by popular implementations?) like<p><pre><code> if __no_overflow(x + y &gt; z) </code></pre> that would make the addition of two ints become long, two shorts become int32, and so on. (Two long longs would internally become BigNums, but that wouldn&#x27;t be exposed.)<p>And while we&#x27;re at it, add a __checked(a+b) construct, that sets a flag if overflow occurs (or maybe raises an assertion - or maybe we should have both options).
评论 #10056065 未加载
评论 #10056073 未加载
autobahn将近 10 年前
Just to give everyone a bit of calm, nobody&#x27;s demonstrated a successful exploit with ASLR bypass.<p>Meaning that while the vulnerable is technically exploitable, the chance of system compromise is very low on modern android phones (I think post 4.0)
评论 #10056240 未加载
anon1385将近 10 年前
&gt;Deadline exceeded – automatically derestricting &gt;The flaw was initially reported over 120 days ago to Google, which exceeds even their own 90-day disclosure deadline.<p>It always seemed likely that Google&#x27;s hubris[1] would come back to haunt them. I guess this is that day.<p>It would be funny if it wasn&#x27;t remote code execution affecting 950 million phones, with no official patch in sight.<p>[1] <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=8896221" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=8896221</a>
评论 #10055879 未加载
评论 #10056014 未加载
评论 #10055858 未加载
VMG将近 10 年前
Why are arithmetic overflows and underflows not exceptions&#x2F;crashes by default, like divison by 0?<p>Aren&#x27;t the cases where you actually <i>want</i> an over&#x2F;underflow the exception? Why not resort to special instructions&#x2F;macros&#x2F;operators for these operations?
评论 #10056242 未加载
评论 #10056113 未加载
评论 #10056149 未加载
评论 #10056334 未加载
cautious_int将近 10 年前
This is a common problem in C. Integer types are inherently type unsafe and are silently promoted with many different rules which are hard to remember and understand. As is seen in this case, even the ( borderline paranoid ) flag -Wconversion would not catch the bug.<p>I think this problem in C would be solved with a single flag: -Wwarn-if-using-integers-of-different-types-in-an-operation , forcing you to cast the integer if the types don&#x27;t match in a arithmetic operation, or an assignment.
评论 #10057337 未加载
pacquiao882将近 10 年前
The bigger issue of libstagefright is that it there&#x27;s a ton of code involved with media playback at the native level that has access to many system resources. This specific exploit was just looking at a small part of the MP4 handling -- one of the many parts within the library. It is very likely more severe exploits like this one will surface as a result of this huge library.
评论 #10056385 未加载
ikeboy将近 10 年前
Can carriers (and by extension, the Hangouts backend itself) check messages and block &quot;evil&quot; ones? Wouldn&#x27;t that be an easier way of fixing these things quickly?<p>At the very least, Google should block any Hangouts message that triggers the bug even on non-updated devices.
ambrop7将近 10 年前
I think the proper check is:<p>&#x2F;&#x2F; size_t size; &#x2F;&#x2F; uint64_t chunk_size;<p>if (chunk_size &gt;= SIZE_MAX - size) { return ERROR_MALFORMED; }<p>Due to size being a size_t and SIZE_MAX being well a maximum size_t, SIZE_MAX-size is properly calculated. The comparison with chunk_size is also properly done (due to the C promotion rules - as strange as they are, they do work &quot;as expected&quot; when your values are nonnegative, which they are here).<p>Also, I am slightly puzzled why one would use SIZE_MAX as a limit rather than some &quot;small&quot; number, like a few megabytes or whatever is a reasonable bound for this buffer. In this case the fix may be a bit more complex than this: if (chunk_size &gt;= SIZE_MAX - size || size + chunk_size &gt; the_limit) .
jsingleton将近 10 年前
There was an Android update pushed to my phone recently. I wanted to know if it was an urgent security fix so I checked the diffs. It&#x27;s hard to tell but it doesn&#x27;t seem to be. It&#x27;s a bunch of fixes to do with video out, SIP etc.<p>I thought maybe the patch fixed this security flaw. It wasn&#x27;t clear what it was for from the phone. I had to do a fair bit of digging. Are there any change-logs or release notes for these system updates?
RexRollman将近 10 年前
IMO, the Android echosystem is a clusterfuck and Google needs to get a hold of it. I would buy a Windows phone before I would buy an Android device.
评论 #10056563 未加载
mondoshawan将近 10 年前
<a href="http:&#x2F;&#x2F;www.cyanogenmod.org&#x2F;blog&#x2F;more-stagefright" rel="nofollow">http:&#x2F;&#x2F;www.cyanogenmod.org&#x2F;blog&#x2F;more-stagefright</a><p>Looks like Cyanogenmod has patched this toot-sweet.
gionn将近 10 年前
So, a security engineer, working at Google, cannot catch that a 4 lines patch is ineffective?
johansch将近 10 年前
Things like this is why I trust an iPhone enough to handle two-factor auth for banking (in Sweden: &quot;Mobil BankId&quot;), but not an Android device.<p>I hope Google will raise the security level now that they have reached global dominance, in no small part through lax security (as a consequence to their liberal licensing models).
评论 #10056010 未加载
评论 #10055998 未加载
评论 #10056923 未加载
评论 #10056225 未加载
评论 #10056189 未加载
评论 #10057861 未加载