Google has just released a list of changes in its latest Bulletin Android Security, in which about twelve Fixed bugs, five of which were classified as critical severity.
Google has just released a list of changes in its latest bulletin Android security, in which about twelve Fixed bugs, five classified as critical severity, were concerned about the safety of the devices. Since Google announced and began offering monthly security updates for Android, the company has been patching the bug that affected the RCE (Remote Code Execution) from its component Media server each month.
Also Read: How To Secure Your Android From Being Hacked
It did in September (CVE-2015-3864), in October (15 bugs in lib-stagefright, part of Mediaserver), in November (CVE-2015-6608), December (CVE-2015-6616), and now again in January (CVE-2015-6636). Some astute users say it is time that Google reconsiders its Media server component, especially to have been the point of origin of the first two Stagefright-related vulnerabilities that affected about dispositions billion; first in August and then in October.
Google Solves Another Security Problem in Android
Of course, bugs are often all kinds of software products; but the frequency and severity with which security researchers suggest happen to Mediaserver Android. Since Google announced plans to migrate code from Java to Android OpenJDK, it seems now is a perfect time.
Also Read: 5 Sure-Signs That Prove Your Android Smartphone Is Infected
The last CERs Media server had traces of Stagefright.
The latest problem only affects devices running version Android 5.0 or higher. Google has stated that the features involved are provided as a central part of the operating system, and many applications allow remote content, such as MMS or content playback via the browser.
This means that, as with the cases of Stagefright, an attacker can create a malicious image or an audio or video file and send it via MMS or play from the user’s browser.
Also Read: How To Restart Android in Safe Mode to Troubleshoot Problems
Given their ability to work with the loopholes of the Android system, they could take control of devices that have set a target. When this happens, an exploit of a bug attacker corrupts memory and executes remote code suddenly, the device made. The same researchers of Google discovered this problem, and the company has said it has not seen any attacks that have been exploiting this bug. But of course, fixing should be the priority of the company.