Close Menu
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
Home»Software»Google fixes critical Wi-Fi and media-processing flaws in Android
Software

Google fixes critical Wi-Fi and media-processing flaws in Android

DeepBy DeepFebruary 16, 2016No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

150817 google marshmallow 03

Google has patched thirteen new vulnerabilities in Android, two of which could allow attackers to take control of Android devices located on the same Wi-Fi network, if the devices have Broadcom chips.

The two critical vulnerabilities are located in the Broadcom Wi-Fi driver and can be exploited by sending specially crafted wireless control packets to the affected devices. These messages could corrupt the kernel’s memory and allow for the execution of arbitrary code in the kernel—the highest privileged area of the operating system.

These flaws are critical because the attack doesn’t require any user interaction, can be exploited remotely and can lead to a complete device compromise.

The driver for Wi-Fi chips from Qualcomm also had a critical vulnerability that could result in arbitrary code execution with kernel privileges. However, it could only be exploited by a locally installed application.

Finally, a third vulnerability was located in the Wi-Fi component and could be exploited by a local application to execute code with system privileges. This vulnerability was rated as high.

Google’s new patches also fix two critical remote code execution vulnerabilities in mediaserver, a component that handles audio and video file parsing, one critical flaw in Qualcomm’s performance event manager component for ARM processors and one in the Debugger daemon component.

The vulnerabilities in the Qualcomm performance module and Debuggerd could be exploited by local applications and the flaw in mediaserver could be exploited through specially crafted media files loaded from websites or embedded into multimedia messages.

The company also fixed high-impact vulnerabilities in libraries including mediaserver and libmediaplayerservice, and two moderate flaws in setup wizard. These flaws could lead to denial of service, information disclosure, privilege escalation and security bypasses.

Google shared information about these flaws with its OEM partners on Jan. 4 and released firmware updates for its Nexus devices Monday. Android firmware that incorporates these fixes should have a security patch level string of February 1, 2016 or later.

The company will also publish these patches to the Android Open Source Project so that other Android-based operating systems such as CyanogenMod can integrate them.

For comprehensive coverage of the Android ecosystem, visit Greenbot.com.

[“source -pcworld”]

Google fixes critical Wi-Fi and media-processing flaws in Android
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Deep

Related Posts

How to Avoid Managing Open Source Software’s

March 24, 2025

Strategies for Structuring and Scaling High-performance Data Labeling Teams

March 12, 2025

Release Your Business Potential in Patna with Custom Programming Advancement Arrangements

February 1, 2025
Recent Post
  • Financial Audits and Payment Compliance: The Role of TPS
  • Social Media and Relationships
  • Online Counselling for Individuals and Couples
  • The Best Time to Post on Threads in 2025 — Data from 700K+ Posts
  • Using AI-powered Enterprise Interfaces to Optimize Operational Efficiency
  • How to Grow Your Brand with Micro Influencer Marketing
  • What Are the 8 Different Types of Video Game Articles?
  • Strategies for Greater Financial Flexibility: 5 Smart Ways to Repay Your Home Loan Faster
Search
  • Home
  • Privacy Policy
  • Contact Us !
© 2025 BlogSpotTips. Designed by BlogSpotTips.

Type above and press Enter to search. Press Esc to cancel.