InShortViral: Google has just released a list of changes in its latest Bulletin Android Security, in which about twelve Fixed bugs, five of which were classified as critical severity.
Google has just released a list of changes in its latest bulletin Android security, in which about twelve Fixed bugs, five of which were classified as critical severity was concerned as to the safety of the devices. Since Google announced and began offering monthly security updates Android, the company has been patching the bug that affected the RCE (Remote Code Execution) from its component Media server each month.
Also Read: How To Secure Your Android From Being Hacked
It did in September (CVE-2015-3864) in October (15 bugs in lib-stagefright, part of Mediaserver), in November (CVE-2015-6608), December (CVE-2015-6616), and now again in January (CVE-2015-6636). Some very smart users say it is the time that Google reconsiders its Media server component, especially to have been the point of origin of the first two Stagefright related vulnerabilities that affected about dispositions billion; first in August and then in October.
Google Solves Another Security Problem in Android
Of course, bugs are often all kinds of software products; but the frequency and severity with which security researchers suggest happens to Mediaserver Android. Since Google announced plans to migrate code from Java to Android OpenJDK it seems that now is a perfect time.
The last CERs Media server had traces of Stagefright.
The latest problem only affects devices running the version of Android 5.0 or higher, and Google has stated that the features affected are provided as a central part of the operating system and there are many applications that allow remote content is reached, as can be MMS or be content playback via the browser.
This means that, as with the cases of Stagefright, an attacker can create a malicious image, or an audio or video file and send it via MMS or play from the browser of the user.
When this happens, an exploit of a bug attacker corrupt memory and execute remote code sudden the device is made. Given their ability to work with the loopholes of the system Android, they could take control of devices that have set a target . The same researchers of Google discovered this problem and the company has said it has not seen any attacks that occurred in exploiting this bug by now. But of course, fix should be the priority of the company .