TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Android crypto key theft vulnerability affects 86% of devices

37 点作者 Titanbase将近 11 年前

2 条评论

userbinator将近 11 年前
One of the first comments there with the partial ARM opcode map shows why this vulnerability is &quot;theoretical&quot; - you can overflow the buffer, but the bytes written to the buffer are restricted so much (values will always be between 43 and 126) that it would be nearly impossible to write useful exploit code.<p>The details are here:<p><a href="http://securityintelligence.com/android-keystore-stack-buffer-overflow-to-keep-things-simple-buffers-are-always-larger-than-needed/" rel="nofollow">http:&#x2F;&#x2F;securityintelligence.com&#x2F;android-keystore-stack-buffe...</a>
评论 #7961374 未加载
MBCook将近 11 年前
The sad thing is how many of these devices, despite being only a year or two old, may only get patched much later or never.<p>I find it interesting that Google is forcing the ability to update [1] Android watches, cars, and TV boxes by limiting OEM customization. I guess the carrot approach hasn&#x27;t been working well enough to convince OEMs.<p>[1] <a href="http://arstechnica.com/gadgets/2014/06/android-wear-auto-and-tv-save-you-from-skins-and-oems-from-themselves/" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;gadgets&#x2F;2014&#x2F;06&#x2F;android-wear-auto-and...</a>
评论 #7960041 未加载
评论 #7959926 未加载
评论 #7960502 未加载