

The bad news is there's not much you can do as an end-user. Download Stagefright Detector of Lockout Mobile Securityīoth apps will let you know if your device is vulnerable to Stagefright.Download Stagefright Detector app from Zimperium Inc.Both of the following apps will tell you if you are vulnerable to the Stagefright. How do you know if your phone is affected? You have a couple of options. How do I know if I am affected by Stagefright?

Some apps, such as Hangouts, automatically process MMS video, so watch out. Fortunately those avenues require the user to manually retrieve the video, unlike MMS, which is retrieved automatically. Researchers have already demonstrated how Stagefright can be triggered via apps or even URLs.

ASLR supposedly protects users from the Stagefright attack method because the RAM an app uses is never the same.īut the process is not perfect and nefarious attempts to circumvent ASLR are apparently already underway. The good news is that Google has clarified that, ever since Android 4.0 Ice Cream Sandwich, a technology known as Address Space Layout Randomizing (ASLR) has been a part of Android. More than 40 percent are running Jelly Bean or earlier. (KitKat also accounts for around 40 percent of users.) Only 18 percent of Android devices are running a version of Android Lollipop and less than three percent are using Android 5.1. This is how the Stagefright exploit works. This number, if you've taken a recent look at the percentages of different Android versions currently in use, is staggering. Stagefright could affect a billion devices, most particularly those running Android Jelly Bean or earlier. It occurs when malicious code is unknowingly triggered by media in multi-media messages (MMS). Stagefright has been called the biggest Android security concern ever. To learn more about the original Stagefright vulnerability and how to guard your phone against it, see our previous coverage below. A rollout from individual carriers will begin soon after. So far no infected devices have been reported. Google is currently working on a fix and says it will issue a security update in October. This audio preview function exists within most versions of Android, so nearly every Android device is susceptible to this exploit. The malicious code can also be sent to a user's phone via public Wi-Fi. How secure is Android, really? / © ANDROIDPITĪ new Stagefright threat that targets Android phones through MP3 and MP4 files has been discovered. The code hides within the audio file and activates once users preview it or visit a page where the file is embedded.
