Code exposure using the Android Stagefright Vulnerability
When Google and its partners are busy pushing patches to devices of end users, attackers can control the attack code of Android devices without their knowledge. The high-risk vulnerability named Stagefright is located in the Android Media Processing code library. Attackers can exploit this vulnerability to send specially crafted MMS text messages and quietly execute malicious code control devices. This vulnerability affects 0.95 billion Android devices. Stagefright was first discovered by security company Zimperium. Although Google and its partners requested the company to suspend the proof-of-concept code for public attacks, the company eventually published the Code on Wednesday. The attack code is a python script that generates an MP4 media file that exploits the vulnerability. Attackers can listen to the sound within the audible range of the microphone and take photos using cameras. Stagefright is invalid for Android 5.0 and later versions.
This article permanently updates the link address: