stagefright_StageFright:Android操作系统中最易受攻击的错误

stagefright_StageFright:Android操作系统中最易受攻击的错误stagefrightIntroduction:介绍:Ifwetalkaboutsmartphonesandandroiddevices,thentherearebillionsofbillionsusersusingandroidOSworldwide.1.5millionandroiddevices…

大家好,又见面了,我是你们的朋友全栈君。如果您正在找激活码,请点击查看最新教程,关注关注公众号 “全栈程序员社区” 获取激活教程,可能之前旧版本教程已经失效.最新Idea2022.1教程亲测有效,一键激活。

Jetbrains全家桶1年46,售后保障稳定

stagefright

1.png

Introduction:

介绍:

 If you keep this figure in mind then there are billions of users using android OS. These figures show just how popular android is right now. People like this OS very much. But due to increase of users, security concerns are rising.

 

2.png

www.statista.com ]
www.statista.com ]

The global market share of android devices is more than 82% worldwide. That means most of the smartphone users are using android OS. But with this increase of users, now mobile security is also at risk – a bug called StageFright has been detected, which places the mobile security of billions of android users at risk. This article describes all about StageFright.

 

android设备的全球市场份额在全球超过82%。 这意味着大多数智能手机用户都在使用Android OS。 但是随着用户数量的增加,现在移动安全也处于危险之中-已检测到一个名为StageFright的错误,这使数十亿android用户的移动安全受到威胁。 本文介绍了有关StageFright的所有内容。
3.png

www.statista.com ]
www.statista.com ]

What is StageFright ?

什么是StageFright?

Who discovered StageFright?

谁发现了StageFright?

A top Android researcher Joshua Drake (@jduck), who works in Zimperium’s zLabs team, discovered the most vulnerable hole in Android OS, which was publicly announced for the first time on July 27, 2015. ‘Stagefright’. Zimperium’s team also calling it ‘Mother of all Android Vulnerabilities’, as it impacts 95% or 950 million of all Android devices and does not require any interaction with the victim.

 

Zimperium的zLabs团队中的一名顶级Android研究人员Joshua Drake(@jduck)发现了Android OS中最脆弱的漏洞,该漏洞于2015年7月27日首次公开发布。“ Stagefright”。 Zimperium的团队还称其为“所有Android漏洞之母”,因为它影响了所有Android设备的95%或9.5亿,并且不需要与受害者进行任何互动。

Why does StageFright make Android users so vulnerable ?

为什么StageFright使Android用户如此脆弱?

See StageFright Demo Video
观看StageFright演示视频

StageFright Versions:

StageFright版本:

There are two versions that exploit Android devices:

有两个版本可以利用Android设备:

StageFright 1.0

StageFright 1.0

StageFright 2.0

StageFright 2.0

StageFright 1.0

StageFright 1.0

A patch for StageFright 1.0 has been released from Google. StageFright 1.0 used auto retrieval mms option of messaging app s& chat apps to send malicious files into your Android device and silently get into it through the libStageFright mechanism (thus the “StageFright” name), which helps Android process mms files. Many text messaging apps — Google’s Hangouts app was specifically mentioned — automatically process that video so it’s ready for viewing as soon as you open the message, and so the attack theoretically could happen without you even knowing it. Google is saying that StageFright 1.0 is fixed. If I talk about my own smartphone (which is a Motorola G), I  got an update that includeda StageFright 1.0 patch to fix it. You can get an idea about StrageFright 1.0 from the below link:

 

Google已发布StageFright 1.0的修补程序。 StageFright 1.0使用消息传递应用程序和聊天应用程序的自动检索mms选项将恶意文件发送到您的Android设备,并通过libStageFright机制(因此称为“ StageFright”名称)以无提示的方式进入该设备,该机制可帮助Android处理mms文件。 许多短信应用程序(特别提到了Google的环聊应用程序)会自动处理该视频,以便您在打开消息后就可以立即观看,因此从理论上讲,攻击甚至可能在您不知情的情况下发生。 Google表示StageFright 1.0已修复。 如果我谈论自己的智能手机(摩托罗拉G),则会得到一个包含StageFright 1.0补丁的更新程序来修复它。 您可以从以下链接中获得有关StrageFright 1.0的想法:

Avast blog for StageFright 1.0
StageFright 1.0的Avast博客

StageFright 2.0

StageFright 2.0

Zimperium, a pair of recently discovered vulnerabilities make it possible for an hacker or attacker to get into Android device with a MP3 or MP4 like file, so when the metadata for that file is previewed by the OS, that file could execute malicious code via website or a human being in the middle of an attack built specifically for delivering these malformed files, this code could be executed without user interaction.
Zimperium称 ,最近发现的一对漏洞使黑客或攻击者可以通过MP3或MP4之类的文件进入Android设备,因此,当操作系统预览该文件的元数据时,该文件可能会执行恶意代码。通过专门针对传递这些格式错误的文件而进行的攻击的网站或人员,无需用户交互即可执行此代码。

 

Zimperium claims to have confirmed remote execution, and brought this to Google’s attention on August 15. In response, Google assigned CVE-2015-3876 and CVE-2015-6602 to the pair of reported issues and started working on a fix.

Is your Android device affected by StageFright 2.0

您的Android设备是否受StageFright 2.0的影响

According to Zimperium
根据Zimperium
In one way or another, yes.
CVE-2015-6602
refers to a vulnerability in libutils, and as Zimperium points out in their post announcing the discovery of this vulnerability it impacts every Android phone and tablet going back as far as Android 1.0.
CVE-2015-3876
affects every Android 5.0 and higher phone or tablet, and could theoretically be delivered via website or man in the middle attack.


What CVE is ?

什么是CVE?

CVE stands for Common Vulnerabilities and Exposures (CVE) system which provides a reference-method for publicly known information-security vulnerabilities and exposures. 

CVE代表“ 常见漏洞和披露 (CVE)”系统,它为公众已知的信息安全提供参考方法 ul 城市和 曝光。

CVE-ID Syntax

CVE-ID语法

There was an old version of CVE syntax also which is little bit different from below defined syntax.

还有一个旧版本的CVE语法 ,与下面定义的语法有点不同。

CVE prefix + Year + Arbitrary Digits [] New syntax implemented from Jan 1st, 2014 ]

CVE前缀+年+任意数字[]从2014年1月1 日开始实施新语法]

www.cvedetails.com you can get more information, resources and links for the particular CVE. I hope that now CVE-YYYY-NNNN is not a new thing for you. You are aware and you can answer if someone asks.
www.cvedetails.com您可以获取有关特定CVE的更多信息,资源和链接。 我希望现在CVE-YYYY-NNNN对您来说不是新事物。 您知道,如果有人问,您可以回答。
4.png

The following figure is clearly showing the difference between old CVE syntax and new CVE syntax which is taken from www.mitre.org

下图清楚地显示了旧的CVE语法和新的CVE语法之间的区别,该区别来自www.mitre.org

5.png

How to know if your Android device is affected by StageFright 2.0 vulnerability

如何知道您的Android设备是否受StageFright 2.0漏洞影响

Google Play Store.
Google Play商店下载他们的应用。

My own experience about StageFright:

我对StageFright的经验:

I was the victim of StageFright 1.0 prior to when the patch had arrived. I had frustrating experiences from StageFright, but it took me a while to realize that my smartphone get hacked by a smart hacker. I noticed that the behavior of my smartphone was changing –  it was behaving like there was some problem, so I took precautions like cleaning the mobile, changing the passwords, locking the screen etc. All these things were troubling me and I was trying to get these things rectified. After some days I read an article about StageFright where symptoms and precautions both were explained. At this point I realized that I was the victim of StageFright 1.0

 

在补丁发布之前,我是StageFright 1.0的受害者。 我从StageFright获得了令人沮丧的经历,但是花了一段时间我才意识到我的智能手机遭到了聪明的黑客的攻击。 我注意到我的智能手机的行为正在发生变化-行为似乎有问题,因此我采取了预防措施,例如清洁手机,更改密码,锁定屏幕等。所有这些事情困扰着我,我试图这些事情纠正了。 几天后,我阅读了一篇有关StageFright的文章,其中对症状和注意事项进行了解释。 此时,我意识到自己是StageFright 1.0的受害者

You can’t believe the things which I noticed then:

您无法相信我当时注意到的事情:

1) When I was using my wifi a file which was just 100-200 KB automatically downloaded and I didn’t find it on the phone, but it was showing when I took a backup using CM Backup app. This is the first incident, where I suspected something was wrong but I ignored it.

 

1)当我使用wifi时,会自动下载一个只有100-200 KB的文件,但我在手机上找不到该文件,但是当我使用CM Backup应用程序进行备份时,该文件正在显示。 这是第一起事件,我怀疑有问题,但我忽略了它。
4) Generally in my home I always leave my wifi-enabled phone on. After a night when I woke up early in the morning I found that my battery drained almost to 19% and in night it was 59%.

 

4)通常,在家里,我总是将启用wifi的手机保持打开状态。 在一个清晨醒来的夜晚之后,我发现我的电池电量几乎耗尽了19%,而晚上则是59%。
avast mobile security. I formatted my mobile changes all passwords from mail to wifi to screen lock and applock and I followed all steps which was described in avast blog.
avast mobile security的文章。 我格式化了手机,将所有密码从邮件更改为wifi,然后将其更改为屏幕锁定和applock,然后按照avast博客中介绍的所有步骤进行操作。

Unfortunately, now StageFright 2.0 has arrived, so be aware. Keep yourself from being a victim, follow the precautions which are given below under the heading “How to fight with StageFright 2.0 until the patch arrives.“ I had a very frustrating and annoying experience with StageFright 1.0.

不幸的是,现在StageFright 2.0已经到货,请注意。 避免自己成为受害者,请遵循下面标题为“如何与StageFright 2.0战斗直到补丁发布之前”的预防措施。我对StageFright 1.0感到非常沮丧和烦恼。

 

Android was my favorite flavor for smartphones but after this incident I am losing my interest in Android devices.

Android是我最喜欢的智能手机版本,但是在此事件之后,我对Android设备失去了兴趣。

How to fight with StageFright 2.0 until the patch arrives:

在补丁发布之前,如何与StageFright 2.0战斗:

1) Try to not download mp3 or mp4 from your web browsers.

1)尝试不要从网络浏览器下载mp3或mp4。

2) Avoid public networks.

2)避免使用公共网络。

3) Secure your wi-fi connection with strong passwords.

3)使用强密码保护您的Wi-Fi连接。

4) Pay attention to where you are browsing and what you are browsing.

4)注意您正在浏览的位置以及正在浏览的内容。

5) Don’t open mp3 or mp4 files from anyone you don’t know.

5)请勿打开您不认识的人的mp3或mp4文件。

OS which have fixed StageFright 2.0

固定了StageFright 2.0的操作系统

Blackphone 2, is a smartphone in which the phone is fully encrypted to tighten the security. The company calls it Silent OS, which is derived from Android (which is open source).
Blackphone 2是一种智能手机,其中电话已完全加密以加强安全性。 该公司将其称为Silent OS,它是从Android(开源)衍生而来的。
Cyanogenmod OS have patched for StageFright 2.0
Cyanogenmod OS已针对StageFright 2.0进行了修补

I am surprised by how little Google is doing, is Google seriously doing something to secure their OS like iPhone doing? iOS is much more secure than Android. iOS releases updates in timely fashion to make it secure and for better performance and keeping an eye on their store. I read the news 10-20 days ago that a Chinese app in iOS was trying to fetch information. Apple quickly blocked that app from their store. This is called secure environment with quick action.
Google所做的工作让我感到惊讶,Google是否真的在做一些事情来保护自己的操作系统(如iPhone)? iOS比Android安全得多。 iOS会及时发布更新,以确保其安全性和更好的性能,并密切关注其商店。 我读了10到20天前的新闻,说iOS中的一个中文应用程序正试图获取信息。 苹果很快从商店中屏蔽了该应用。 这被称为快速行动的安全环境。

References:

参考文献:

1) www.wikipedia.com

1) www.wikipedia.com

2) www.bgr.com

2) www.bgr.com

3) www.pcworld.com

3) www.pcworld.com

4) www.androidcentral.com

4) www.androidcentral.com

5) www.statista.com

5) www.statista.com

6) www.cvedetails.com

6) www.cvedetails.com

7) www.mitre.org

7) www.mitre.org

Final Words:

最后的话:


 

Happy reading. Please share your views via comments.

祝您阅读愉快。 请通过评论分享您的观点。

翻译自: https://www.experts-exchange.com/articles/21599/StageFright-The-most-vulnerable-bug-in-Android-OS.html

stagefright

版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请联系我们举报,一经查实,本站将立刻删除。

发布者:全栈程序员-站长,转载请注明出处:https://javaforall.net/215878.html原文链接:https://javaforall.net

(0)
全栈程序员-站长的头像全栈程序员-站长


相关推荐

  • 递归入门

    递归入门

    2021年9月27日
    50
  • 哈佛大学公开课《幸福课》笔记「建议收藏」

    哈佛大学公开课《幸福课》笔记「建议收藏」目录概述第一讲什么是积极心理学第二讲为何研究积极心理学?第三讲幸福是一种随机现象吗?第四讲积极的环境可以改变人第五讲环境的力量第六讲乐观主义第七讲逆境还是机遇第八讲感激第九讲改变第十讲如何去改变第十一讲养成良好的习惯第十二讲写日记第十三讲面对压力第十四讲过犹不及第十五讲完美主义第十六讲享受过程第十七讲运动与冥想第十八讲睡眠、触摸和爱情的重要性第十九讲如何让爱情地…

    2022年7月25日
    16
  • BN层的作用_bn层加在哪里

    BN层的作用_bn层加在哪里一:BN层李宏毅视频讲解BN(BatchNormalization)层的作用(1)加速收敛(2)控制过拟合,可以少用或不用Dropout和正则(3)降低网络对初始化权重不敏感(4)允许使用较大的学习率 链接:https://www.zhihu.com/question/38102762/answer/85238569来源:知乎1.WhatisBN?顾名思义,batchnormalizat…

    2022年10月10日
    0
  • 全局路径规划:图搜索算法介绍4(RRT/RRT*)

    全局路径规划:图搜索算法介绍4(RRT/RRT*)本节介绍RRT/RRT*的算法:RRT的基本原理是:我们首先初始化我们的起点,接下来随机撒点,选出一个x_rand,在x_near和x_rand之间选择一个x_new,再在原有的已经存在的x中找到离这个点最近的点将这两个点连接起来,同时这个最近的点也会作为x_new的父节点。RRT算法的伪代码如下:对照着图,再看一次:首先我们随机生成一个点,x_rand然后再tree上面…

    2022年10月24日
    0
  • 命令行升级pip_pip升级版本命令

    命令行升级pip_pip升级版本命令查询当前pythonpip版本:pipshowpip输入python-mpipinstall–upgradepip命令升级;报错:ERROR:CouldnotinstallpackagesduetoanEnvironmentError:[WinError5]拒绝访问。:‘c:\programfiles\python37\lib\site-packages\pip-19.2.3.dist-info\entry_points.txt’Considerusin.

    2025年6月19日
    1
  • Python数组的使用_算法高效性

    Python数组的使用_算法高效性如果我们需要一个只包含数字的列表,那么使用数组方式比list方式更高效。而且数组还支持所有跟可变序列有关的操作,比如移除列表中的一个元素(.pop)、插入元素(.insert)和在列表末尾一次性追加另一个序列中的多个值(.extend)。除此之外,数组还定义从文件读取(.frombytes)与写入(.tofile)的效率更高的方法。创建数组需要一个类型码,形如array(‘d’),这个类型码是用来表示在底层实现的C语言的数据类型。一般我们用的Python底层是用C语言编写实现的&n

    2022年8月13日
    3

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注

关注全栈程序员社区公众号