查看: 116|回复: 0

[其他] 每日一帖3 Android bug fear in 900 million phones

[复制链接]

18

主题

3

好友

526

积分

举人

Rank: 4

  • TA的每日心情
    慵懒
    2016-11-17 11:09
  • 签到天数: 45 天

    [LV.5]常住居民I

    发表于 2016-8-11 02:55:43 |显示全部楼层
    本帖最后由 enenge 于 2016-8-11 02:56 编辑



    高通的锅,硬件有BUG。

    The flaws affect devices containing Qualcomm chips
    Serious security flaws that could give attackers complete access to a phone's data have been found in software used on tens of millions of Android devices.
    The bugs were uncovered by Checkpoint researchers looking at software running on chipsets made by US firm Qualcomm.
    Qualcomm processors are found in about 900 million Android phones, the company said.
    However, there is no evidence of the vulnerabilities currently being used in attacks by cyberthieves.
    "I'm pretty sure you will see these vulnerabilities being used in the next three to four months," said Michael Shaulov, head of mobility product management at Checkpoint.
    "It's always a race as to who finds the bug first, whether it's the good guys or the bad."
    Affected devices included:
    • BlackBerry Priv and Dtek50
    • Blackphone 1 and Blackphone 2
    • Google Nexus 5X, Nexus 6 and Nexus 6P
    • HTC One, HTC M9 and HTC 10
    • LG G4, LG G5, and LG V10
    • New Moto X by Motorola
    • OnePlus One, OnePlus 2 and OnePlus 3
    • US versions of the Samsung Galaxy S7 and Samsung S7 Edge
    • Sony Xperia Z Ultra
    Mr Shaulov said six months of work to reverse engineer Qualcomm's code revealed the problems.
    The flaws were found in software that handles graphics and in code that controls communication between different processes running inside a phone.
    Exploiting the bugs would allow an attacker to gradually be able to take more control over a device and gain access to its data.
    The flaws could be used to make booby-trapped apps that steadily gain access to a phone's data
    Checkpoint handed information about the bugs and proof of concept code to Qualcomm earlier this year.
    In response, Qualcomm is believed to have created patches for the bugs and started to use the fixed versions in its factories.
    It has also distributed the patches to phone makers and operators. However, it is not clear how many of those companies have issued updates to customers' phones.
    Checkpoint has created a free app called QuadRooter Scanner that can be used to check if a phone is vulnerable to any of the bugs, by looking to see if the patches for them have been downloaded and installed.
    In addition, Mr Shaulov said Android owners should only download apps from the official Google Play store to avoid falling victim to malicious programs.
    "People should call whoever sold them their phone, their operator or the manufacturer, and beg them for the patches," said Mr Shaulov.
    In a statement, Qualcomm said: "We were notified by the researcher about these vulnerabilities between February and April of this year, and made patches available for all four vulnerabilities to customers, partners, and the open source community between April and July.
    "We continue to work proactively both internally as well as with security researchers to identify and address potential security vulnerabilities."
    This article was updated on 10 August 2016 to add a response from Qualcomm.


    回复

    使用道具 举报

    您需要登录后才可以回帖 登录 | 立即注册

    关闭

    站长推荐上一条 /5 下一条


    手机版|爱板网 |网站地图  

    GMT+8, 2016-12-10 11:04 , Processed in 0.110314 second(s), 9 queries , Memcache On.

    苏公网安备 32059002001056号

    Powered by Discuz!

    回顶部