📜 ⬆️ ⬇️

Google fixed Android vulnerabilities

Google has released a monthly update for Android called Nexus Security Bulletin - March 2016 . The update fixes 19 vulnerabilities in the mobile OS. Seven of them have the status of Critical and can be used by attackers to remotely execute code on a device or enhance their privileges. As usual, two critical vulnerabilities with identifiers CVE-2016-0815 and CVE-2016-0816 were fixed in the Mediaserver service. They allowed attackers to remotely execute code in Android with elevated privileges, for which malicious web content or an MMS message could be used.



Another RCE vulnerability with identifier CVE-2016-1621 also applies to the Mediaserver, but is present in the libvpx library that is used by this service. The mechanism of exploitation of the vulnerability is similar to the previous one; for this, malicious web content or an MMS message can be used. The vulnerability is relevant for Android versions 4.4.4, 5.0.2, 5.1.1, 6.0.
')

Fig. List of updated vulnerabilities.

The update fixes the dangerous vulnerability CVE-2016-0818 type Elevation of Privilege (EoP), which is present in the Conscrypt library. It allows you to successfully pass a legitimacy test in a specially formed fake digital certificate that was issued by an intermediate certificate authority (CA). Thus, the vulnerability allows an attacker to conduct a Man-in-the-Middle attack. Actual for the following versions of Android: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1.

Critical EoP type CVE-2016-0819 vulnerability is present in the Qualcomm performance measurement component and can be used by attackers to elevate their rights in the system to the kernel level. Actual for the following versions of Android: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1.

Similar to the two previous ones, the CVE-2016-0820 EoP type vulnerability is present in the MediaTek Wi-Fi driver and allows attackers to execute their code at the Android kernel level. Actual for Android 6.0.1.

The CVE-2016-0823 vulnerability in the Android 6.0.1 kernel allows attackers to bypass the security mechanisms built into the OS, for example, ASLR.

For a description of other vulnerabilities, see source.android.com/security/bulletin/2016-03-01.html#security_vulnerability_summary .

image
be secure.

Source: https://habr.com/ru/post/278783/


All Articles