stagefright_StageFright:Android操作系统中最易受攻击的错误

stagefright_StageFright:Android操作系统中最易受攻击的错误stagefrightIntroduction:介绍:Ifwetalkaboutsmartphonesandandroiddevices,thentherearebillionsofbillionsusersusingandroidOSworldwide.1.5millionandroiddevices…

大家好,又见面了,我是你们的朋友全栈君。如果您正在找激活码,请点击查看最新教程,关注关注公众号 “全栈程序员社区” 获取激活教程,可能之前旧版本教程已经失效.最新Idea2022.1教程亲测有效,一键激活。

Jetbrains全家桶1年46,售后保障稳定

stagefright

1.png

Introduction:

介绍:

 If you keep this figure in mind then there are billions of users using android OS. These figures show just how popular android is right now. People like this OS very much. But due to increase of users, security concerns are rising.

 

2.png

www.statista.com ]
www.statista.com ]

The global market share of android devices is more than 82% worldwide. That means most of the smartphone users are using android OS. But with this increase of users, now mobile security is also at risk – a bug called StageFright has been detected, which places the mobile security of billions of android users at risk. This article describes all about StageFright.

 

android设备的全球市场份额在全球超过82%。 这意味着大多数智能手机用户都在使用Android OS。 但是随着用户数量的增加,现在移动安全也处于危险之中-已检测到一个名为StageFright的错误,这使数十亿android用户的移动安全受到威胁。 本文介绍了有关StageFright的所有内容。
3.png

www.statista.com ]
www.statista.com ]

What is StageFright ?

什么是StageFright?

Who discovered StageFright?

谁发现了StageFright?

A top Android researcher Joshua Drake (@jduck), who works in Zimperium’s zLabs team, discovered the most vulnerable hole in Android OS, which was publicly announced for the first time on July 27, 2015. ‘Stagefright’. Zimperium’s team also calling it ‘Mother of all Android Vulnerabilities’, as it impacts 95% or 950 million of all Android devices and does not require any interaction with the victim.

 

Zimperium的zLabs团队中的一名顶级Android研究人员Joshua Drake(@jduck)发现了Android OS中最脆弱的漏洞,该漏洞于2015年7月27日首次公开发布。“ Stagefright”。 Zimperium的团队还称其为“所有Android漏洞之母”,因为它影响了所有Android设备的95%或9.5亿,并且不需要与受害者进行任何互动。

Why does StageFright make Android users so vulnerable ?

为什么StageFright使Android用户如此脆弱?

See StageFright Demo Video
观看StageFright演示视频

StageFright Versions:

StageFright版本:

There are two versions that exploit Android devices:

有两个版本可以利用Android设备:

StageFright 1.0

StageFright 1.0

StageFright 2.0

StageFright 2.0

StageFright 1.0

StageFright 1.0

A patch for StageFright 1.0 has been released from Google. StageFright 1.0 used auto retrieval mms option of messaging app s& chat apps to send malicious files into your Android device and silently get into it through the libStageFright mechanism (thus the “StageFright” name), which helps Android process mms files. Many text messaging apps — Google’s Hangouts app was specifically mentioned — automatically process that video so it’s ready for viewing as soon as you open the message, and so the attack theoretically could happen without you even knowing it. Google is saying that StageFright 1.0 is fixed. If I talk about my own smartphone (which is a Motorola G), I  got an update that includeda StageFright 1.0 patch to fix it. You can get an idea about StrageFright 1.0 from the below link:

 

Google已发布StageFright 1.0的修补程序。 StageFright 1.0使用消息传递应用程序和聊天应用程序的自动检索mms选项将恶意文件发送到您的Android设备,并通过libStageFright机制(因此称为“ StageFright”名称)以无提示的方式进入该设备,该机制可帮助Android处理mms文件。 许多短信应用程序(特别提到了Google的环聊应用程序)会自动处理该视频,以便您在打开消息后就可以立即观看,因此从理论上讲,攻击甚至可能在您不知情的情况下发生。 Google表示StageFright 1.0已修复。 如果我谈论自己的智能手机(摩托罗拉G),则会得到一个包含StageFright 1.0补丁的更新程序来修复它。 您可以从以下链接中获得有关StrageFright 1.0的想法:

Avast blog for StageFright 1.0
StageFright 1.0的Avast博客

StageFright 2.0

StageFright 2.0

Zimperium, a pair of recently discovered vulnerabilities make it possible for an hacker or attacker to get into Android device with a MP3 or MP4 like file, so when the metadata for that file is previewed by the OS, that file could execute malicious code via website or a human being in the middle of an attack built specifically for delivering these malformed files, this code could be executed without user interaction.
Zimperium称 ,最近发现的一对漏洞使黑客或攻击者可以通过MP3或MP4之类的文件进入Android设备,因此,当操作系统预览该文件的元数据时,该文件可能会执行恶意代码。通过专门针对传递这些格式错误的文件而进行的攻击的网站或人员,无需用户交互即可执行此代码。

 

Zimperium claims to have confirmed remote execution, and brought this to Google’s attention on August 15. In response, Google assigned CVE-2015-3876 and CVE-2015-6602 to the pair of reported issues and started working on a fix.

Is your Android device affected by StageFright 2.0

您的Android设备是否受StageFright 2.0的影响

According to Zimperium
根据Zimperium
In one way or another, yes.
CVE-2015-6602
refers to a vulnerability in libutils, and as Zimperium points out in their post announcing the discovery of this vulnerability it impacts every Android phone and tablet going back as far as Android 1.0.
CVE-2015-3876
affects every Android 5.0 and higher phone or tablet, and could theoretically be delivered via website or man in the middle attack.


What CVE is ?

什么是CVE?

CVE stands for Common Vulnerabilities and Exposures (CVE) system which provides a reference-method for publicly known information-security vulnerabilities and exposures. 

CVE代表“ 常见漏洞和披露 (CVE)”系统,它为公众已知的信息安全提供参考方法 ul 城市和 曝光。

CVE-ID Syntax

CVE-ID语法

There was an old version of CVE syntax also which is little bit different from below defined syntax.

还有一个旧版本的CVE语法 ,与下面定义的语法有点不同。

CVE prefix + Year + Arbitrary Digits [] New syntax implemented from Jan 1st, 2014 ]

CVE前缀+年+任意数字[]从2014年1月1 日开始实施新语法]

www.cvedetails.com you can get more information, resources and links for the particular CVE. I hope that now CVE-YYYY-NNNN is not a new thing for you. You are aware and you can answer if someone asks.
www.cvedetails.com您可以获取有关特定CVE的更多信息,资源和链接。 我希望现在CVE-YYYY-NNNN对您来说不是新事物。 您知道,如果有人问,您可以回答。
4.png

The following figure is clearly showing the difference between old CVE syntax and new CVE syntax which is taken from www.mitre.org

下图清楚地显示了旧的CVE语法和新的CVE语法之间的区别,该区别来自www.mitre.org

5.png

How to know if your Android device is affected by StageFright 2.0 vulnerability

如何知道您的Android设备是否受StageFright 2.0漏洞影响

Google Play Store.
Google Play商店下载他们的应用。

My own experience about StageFright:

我对StageFright的经验:

I was the victim of StageFright 1.0 prior to when the patch had arrived. I had frustrating experiences from StageFright, but it took me a while to realize that my smartphone get hacked by a smart hacker. I noticed that the behavior of my smartphone was changing –  it was behaving like there was some problem, so I took precautions like cleaning the mobile, changing the passwords, locking the screen etc. All these things were troubling me and I was trying to get these things rectified. After some days I read an article about StageFright where symptoms and precautions both were explained. At this point I realized that I was the victim of StageFright 1.0

 

在补丁发布之前,我是StageFright 1.0的受害者。 我从StageFright获得了令人沮丧的经历,但是花了一段时间我才意识到我的智能手机遭到了聪明的黑客的攻击。 我注意到我的智能手机的行为正在发生变化-行为似乎有问题,因此我采取了预防措施,例如清洁手机,更改密码,锁定屏幕等。所有这些事情困扰着我,我试图这些事情纠正了。 几天后,我阅读了一篇有关StageFright的文章,其中对症状和注意事项进行了解释。 此时,我意识到自己是StageFright 1.0的受害者

You can’t believe the things which I noticed then:

您无法相信我当时注意到的事情:

1) When I was using my wifi a file which was just 100-200 KB automatically downloaded and I didn’t find it on the phone, but it was showing when I took a backup using CM Backup app. This is the first incident, where I suspected something was wrong but I ignored it.

 

1)当我使用wifi时,会自动下载一个只有100-200 KB的文件,但我在手机上找不到该文件,但是当我使用CM Backup应用程序进行备份时,该文件正在显示。 这是第一起事件,我怀疑有问题,但我忽略了它。
4) Generally in my home I always leave my wifi-enabled phone on. After a night when I woke up early in the morning I found that my battery drained almost to 19% and in night it was 59%.

 

4)通常,在家里,我总是将启用wifi的手机保持打开状态。 在一个清晨醒来的夜晚之后,我发现我的电池电量几乎耗尽了19%,而晚上则是59%。
avast mobile security. I formatted my mobile changes all passwords from mail to wifi to screen lock and applock and I followed all steps which was described in avast blog.
avast mobile security的文章。 我格式化了手机,将所有密码从邮件更改为wifi,然后将其更改为屏幕锁定和applock,然后按照avast博客中介绍的所有步骤进行操作。

Unfortunately, now StageFright 2.0 has arrived, so be aware. Keep yourself from being a victim, follow the precautions which are given below under the heading “How to fight with StageFright 2.0 until the patch arrives.“ I had a very frustrating and annoying experience with StageFright 1.0.

不幸的是,现在StageFright 2.0已经到货,请注意。 避免自己成为受害者,请遵循下面标题为“如何与StageFright 2.0战斗直到补丁发布之前”的预防措施。我对StageFright 1.0感到非常沮丧和烦恼。

 

Android was my favorite flavor for smartphones but after this incident I am losing my interest in Android devices.

Android是我最喜欢的智能手机版本,但是在此事件之后,我对Android设备失去了兴趣。

How to fight with StageFright 2.0 until the patch arrives:

在补丁发布之前,如何与StageFright 2.0战斗:

1) Try to not download mp3 or mp4 from your web browsers.

1)尝试不要从网络浏览器下载mp3或mp4。

2) Avoid public networks.

2)避免使用公共网络。

3) Secure your wi-fi connection with strong passwords.

3)使用强密码保护您的Wi-Fi连接。

4) Pay attention to where you are browsing and what you are browsing.

4)注意您正在浏览的位置以及正在浏览的内容。

5) Don’t open mp3 or mp4 files from anyone you don’t know.

5)请勿打开您不认识的人的mp3或mp4文件。

OS which have fixed StageFright 2.0

固定了StageFright 2.0的操作系统

Blackphone 2, is a smartphone in which the phone is fully encrypted to tighten the security. The company calls it Silent OS, which is derived from Android (which is open source).
Blackphone 2是一种智能手机,其中电话已完全加密以加强安全性。 该公司将其称为Silent OS,它是从Android(开源)衍生而来的。
Cyanogenmod OS have patched for StageFright 2.0
Cyanogenmod OS已针对StageFright 2.0进行了修补

I am surprised by how little Google is doing, is Google seriously doing something to secure their OS like iPhone doing? iOS is much more secure than Android. iOS releases updates in timely fashion to make it secure and for better performance and keeping an eye on their store. I read the news 10-20 days ago that a Chinese app in iOS was trying to fetch information. Apple quickly blocked that app from their store. This is called secure environment with quick action.
Google所做的工作让我感到惊讶,Google是否真的在做一些事情来保护自己的操作系统(如iPhone)? iOS比Android安全得多。 iOS会及时发布更新,以确保其安全性和更好的性能,并密切关注其商店。 我读了10到20天前的新闻,说iOS中的一个中文应用程序正试图获取信息。 苹果很快从商店中屏蔽了该应用。 这被称为快速行动的安全环境。

References:

参考文献:

1) www.wikipedia.com

1) www.wikipedia.com

2) www.bgr.com

2) www.bgr.com

3) www.pcworld.com

3) www.pcworld.com

4) www.androidcentral.com

4) www.androidcentral.com

5) www.statista.com

5) www.statista.com

6) www.cvedetails.com

6) www.cvedetails.com

7) www.mitre.org

7) www.mitre.org

Final Words:

最后的话:


 

Happy reading. Please share your views via comments.

祝您阅读愉快。 请通过评论分享您的观点。

翻译自: https://www.experts-exchange.com/articles/21599/StageFright-The-most-vulnerable-bug-in-Android-OS.html

stagefright

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请发送邮件至 举报,一经查实,本站将立刻删除。

发布者:全栈程序员-用户IM,转载请注明出处:https://javaforall.cn/215878.html原文链接:https://javaforall.cn

【正版授权,激活自己账号】: Jetbrains全家桶Ide使用,1年售后保障,每天仅需1毛

【官方授权 正版激活】: 官方授权 正版激活 支持Jetbrains家族下所有IDE 使用个人JB账号...

(0)
blank

相关推荐

  • datax(5):改造升级-自动识别py环境,执行datax任务

    datax(5):改造升级-自动识别py环境,执行datax任务1思考上篇文章已经研究过datax.py文件,产生2个问题:如果用户不是py2环境(datax默认要求环境)怎么处理;能不能有一个脚本自动识别用户的py环境,从而执行datax任务2效果在py2或py3下执行下面命令>pythondatax.py../job/job.json熟悉的配方,熟悉的味道。什么都没有变,但是背后却做了很多事情;3改造过程3.1编写py3的datax脚本共计3个文件===datax.py文件===#!/usr/bin/envpyt.

  • vue devtools如何使用调试_千牛提示opendevtools

    vue devtools如何使用调试_千牛提示opendevtoolsWriteByMonkeyfly以下内容均为原创,如需转载请注明出处。前提今天准备开始学vue.js了,不为别的,只是因为我女朋友毕设项目的前端是使用vue开发的,而我作为一个前端开发却无能为力,你说可不可笑。她需要一个会vue的前端帮她做界面,而我虽然身为一个前端开发,但是并不会vue,所以作为男朋友的我本身就很自责。现阶段的情况是:我只是知道有这些框架,再加上公司的项…

  • C语言学生成绩管理系统设计 《C语言程序设计》实训报告[通俗易懂]

    C语言学生成绩管理系统设计 《C语言程序设计》实训报告[通俗易懂]一、课程设计题目《学生成绩管理系统设计》二、实训目的(1)掌握结构化程序设计的基本方法,基本掌握面向对象程序设计的基本思路和方法。(2)掌握C++的基本概念和基础知识。(3)通过训练能够读懂较为复杂的C++语言源程序并具备基本C++语言程序设计的能力。(4)通过实训,培养自己编写、调试、分析程序的能力。(5)培养自己独立解决问题,查找资料的能力。同学之间相互帮助,相互交流,相互合作的团队精神。(6)培养自己良好的学习兴趣,独立的编程风格。(7)通过实训检查自己学习上的

  • 动态规划之01背包问题及其优化(python实现)「建议收藏」

    动态规划之01背包问题及其优化(python实现)「建议收藏」动态规划之01背包问题及其优化(python实现)**背包问题(**Knapsackproblem)是一种组合优化的NP完全问题。问题描述为:给定一组物品,每种物品都有自己的重量和价格,在限定的总重量内,我们如何选择,才能使得物品的总价格最高。问题的名称来源于如何选择最合适的物品放置于给定背包中。解决思路:动态规划,对每一件物品遍历背包容量,当背包可容纳值大于等于当前物品,与之前已放…

  • 测试用例和缺陷报告的区别_测试用例怎么写 实例

    测试用例和缺陷报告的区别_测试用例怎么写 实例测试用例和缺陷报告模板对于测试工程师,必备技能之一便是测试用例的编写和软件缺陷报告的编写啦~下面提供一些模板还有项目实战样例供大家参考参考,通过Excel表格编写测试用例缺陷报告模板下面来个实战案例在线课程作业管理系统项目测试用例(部分)缺陷报告实例…

  • 检查网站有没有被挂马_安全网址检测

    检查网站有没有被挂马_安全网址检测介绍很多网站都被挂过马,挂马即在获取服务器的部分权限或所有权限后,向网页文件中插入一段恶意代码,即挂马。这些恶意代码可以是浏览器漏洞的利用代码,也可以是赚取流量的代码,或者是盗取账号的代码。URLSnooperurlsnooper字面理解即url窥探,官方说明是可以帮助用户发现音频和视频文件的url地址。下载地址是http://www.donationcoder.com/softw…

发表回复

您的电子邮箱地址不会被公开。

关注全栈程序员社区公众号