Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!



Results 1 to 2 of 2
  1. #1
    Extreme User
    Blitz's Avatar
    Reputation Points
    49366
    Reputation Power
    100
    Join Date
    Jan 2014
    Posts
    6,215
    Time Online
    205 d 21 h 34 m
    Avg. Time Online
    1 h 19 m
    Mentioned
    933 Post(s)
    Quoted
    694 Post(s)
    Liked
    5809 times
    Feedbacks
    72 (100%)

    Android KeyStore Vulnerability Affects Vast Majority of Devices

    Over 86 percent of all Android devices remain vulnerable
    The flagrant fragmentation that has come to be associated with Android is once again in focus, with IBM Security researchers shedding light on a major vulnerability (CVE-2014-3100) affecting the all-important Android KeyStore service, which is used for storing cryptographic keys and other sensitive credentials. Although the said vulnerability has been fixed in the latest version of the operating system (Android Kitkat 4.4), the problem is that the vast majority of Android users don’t have the latest version.

    According to the security advisory issued by the IBM security researchers, they discovered this Android KeyStore stack buffer overflow vulnerability over nine months ago, and in keeping with their responsible disclosure policy, quietly reported it to the Android security team. They refrained from going public for so long mainly due to the seriousness of the vulnerability and “Android’s fragmented nature.”

    Per the advisory, an attacker can use the vulnerability to execute malicious code under the KeyStore process on devices running Android 4.3 or lower (around 86 percent of all Android devices), with the successful exploitation having the potential to expose the device’s lock credentials, leak cryptographic keys, and enable unauthorized “crypto operations (e.g., arbitrary data signing).”

    However, the advisory notes that exploiting the flaw isn’t exactly a cakewalk, as Android has a number of built-in safeguards against such malicious code execution, including data execution prevention (DEP) and address space layout randomization (ASLR).

  2. #2
    Power User FuukoShiira's Avatar
    Reputation Points
    213
    Reputation Power
    42
    Join Date
    Nov 2013
    Posts
    160
    Time Online
    1 d 11 h 29 m
    Avg. Time Online
    N/A
    Mentioned
    1 Post(s)
    Quoted
    2 Post(s)
    Liked
    4 times
    Feedbacks
    1 (100%)
    Yeah android user need to update to the lastest software


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •