The vulnerability which is a extension of Stagefright has been found to be critical and has been accordedCVE-2015-3842.

How it works

Trend says that this vulnerability involvesAudioEffect, a component of themediaserverprogram.

It uses an unchecked variable which comes from the client, which is usually an app.

Android vulnerability allows hackers to install malware through MMS

PoC App developed by Trend to test the vulnerability

Below is a portion of the PoCs Java language source code.

In the PoC, when the app is running, the mediaserver component will crash at a random function.

If the mediaserver component doesnt crash, the POC app can be closed and run again.

Critical Android vulnerability allows hackers to install malware by sending a multimedia message

PoC App developed by Trend to test the vulnerability

The hackers can control on how they want to attack the target smartphone.

The malicious can decide when to start the attack and when to cease it.

Devices with customized versions of Android but with no modification made to themediaservercomponent are also affected.

Critical Android vulnerability allows hackers to install malware by sending a multimedia message

Proof of Concept

Trend has also stated that it has not yet noticed the vulnerability being exploited in the wild.

spot_img

source: www.techworm.net