RAMpage – A security failure affects Androids from 2012 – Diolinux



[ad_1]

A new security vulnerability has been discovered in the world's most popular smartphone operating system, Android, which can affect virtually all versions of the system as of 2012.

<img alt = " Android failure "border =" 0 "date-original-height =" 450 "date-original-width =" 800 "height =" 360 "src =" https://3.bp.blogspot.com/-BUz32O_KZG4 / WzfEXxOYbRI / AAAAAAAApdE / 8U4SNndV-RsDx5JI40ersyvLye78gm5YACLcBGAs / s640 Eight academics from three different universities jointly reported on the discovery of a security flaw that affects Android and was […] [E-mail] [Envoyer à un ami] RAMpage breaks down the fundamental isolation between the user-installed applications and the operating system's own operating processes, recalling a few flaws we had this year in Intel processors on traditional computers.

] The explorer RAMpage allows attackers to access data stored on the device, and can include pbadwords stored in applications or browsers, photos and videos, e-mails, instant messages, and so on.

RAMpage attacks the ION Androids subsystem, which is a memory allocation driver that has been released by Google with the Android 4.0 Ice Cream Sandwich. What is curious is that the researchers say that RAMpage is versatile and that it is conceivable to see attacks on it on iOS devices and even desktops.

Because RAMpage is for ION, gadgets using LPDDR2 / 3/4 RAM are affected. In other words, if your Android phone was launched during or after 2012, it is potentially vulnerable to attack.

Research involving RAMpage is still relatively new, but now that a projector is placed on it, we expect Google and other OEMs to do their part to get patched devices for them. users around the world. What could again weigh is this fragmentation of the device, as we discussed in the article yesterday on Android GO .

Source
_____________________________________________________________________________

Have you seen any errors or would you like to add any suggestions to this? Collaborate, click here

[ad_2]
Source link