Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

12:15 PM
Connect Directly

There's Another Android Media Vulnerability, But Google Isn't Worried

Vulnerability could become a favorite of ransomware operators, but Google has left it unpatched for more than two months.

Days after a critical vulnerability in the Stagefright multimedia playback engine broke headlines -- and maybe opened a new era in Android threats -- Trend Micro has gone public with another vulnerability affecting the way Android handles multimedia files. Researchers believe that the unpatched bug -- which Google has known about for over two months -- may become a popular in for mobile ransomware.

The vulnerability is in the Android mediaserver service used to index media files, and affects Android versions 4.3 (JellyBean) to 5.1.1 (Lollipop), which amounts to over half Android devices in use today.

According to researchers, it can "render a phone apparently dead -- silent, unable to make calls, with a lifeless screen."

Exploits may be delivered through either a specially crafted website or a malicious app. Mediaserver then cannot correctly process malformed video files, which causes the service to crash, "and with it, the rest of the operating system." If the screen was locked, it cannot be unlocked. If the malicious app is written to auto-start whenever the device boots up, it would cause the OS to crash again every time the device is turned on.

According to Trend Micro: "Whatever means is used to lure in users, the likely payload is the same. Ransomware is likely to use this vulnerability as a new 'threat' for users: in addition to ... the device being encrypted, the device itself would be locked out and unable to be used. This would increase the problems the user faces and make them more likely to pay any ransom."

Researchers reported the vulnerability to Google May 15; Google labeled it low-priority May 20 and has not yet provided a patch. No exploits have yet appeared in the wild.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Author
8/3/2015 | 5:27:33 PM
What does this mean for BYOD Enterprise Users?
This vulnerability will have serious implications when it comes to how corporate administrators will provide access into their networks/applications going forward. Traditional controls like MDM are most efficient when there is a baseline of "trusted" device types, typically used when evaluating devices entering a trusted network. In this case (and Stagefright), while there may be availabie fixes, providers are lagging in making it available to actual users essentially leaving these devices unprotected.

Corporate administrators without a proper remediation will likely begin to remove all access to network resources on a broader scale until they can validate their network is not introducing this risk within their organization. That means the "flexibility" and "availability" touted by BYOD programs will be essentially nill.

User Rank: Ninja
7/30/2015 | 12:48:31 PM
High Priority
Seems like a pretty high priority to me. Have they labeled it as low due to the lack of data in the wild? Now that it has had public release it will most likely become more prevalent.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-05-27
A race condition was found in the mkhomedir tool shipped with the oddjob package in versions before 0.34.5 and 0.34.6 wherein, during the home creation, mkhomedir copies the /etc/skel directory into the newly created home and changes its ownership to the home's user without properly checking the hom...
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data.
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation.
PUBLISHED: 2020-05-26
The boost ASIO wrapper in net/asio.cpp in Pichi before 1.3.0 lacks TLS hostname verification.
PUBLISHED: 2020-05-26
An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification.