Google corrects 11 critical exploits in the mobile operating system with the July Android security update



[ad_1]

Google recently deployed the "July Security Update" for Android devices. The July security update fixes about 44 different vulnerabilities in the operating system, the company released the July Android security patch for Pixel and eligible Nexus devices such as Pixel, Pixel XL, Pixel 2, Pixel 2XL, Nexus6P and Nexus 5X. 19659002] Google corrects 11 critical exploits in the mobile operating system "title =" Google corrects 11 critical exploits in the mobile operating system "data-cl-slideshow =" "data-cl-title =" Google corrects 11 critical exploits in the mobile operating system "data-cl-description =" "data-cl-imageid =" 52056-0 "src =" / img / loading.gif "onload =" pagespeed.lazyLoadImages .loadIfVisibleAndMaybeBeacon (this); "onerror =" this.onerror = null; pagespeed.lazyLoadImages.loadIfVisibleAndMaybeBeacon (this); "/>

According to a Beebom report, the July Security Bulletin mentions that most of the 44 vulnerabilities have been clbadified as high severity in the mobile operating system, where the most serious vulnerability was a critical security vulnerability in the Android OS Media framework.If this vulnerability is exploited, it allows a remote attacker to save a specially crafted file to execute arbitrary code with respect to the process. privileged, "states Google.

Critical Remote Code Execution (RCE) vulnerabilities that are found in the Android.Google operating system also mentioned that these exploits were discovered all around the platform, will have an impact on the system, Media Framework and the general framework of Android., the company mentions, "The most serious vulnerability (CVE-2018-9433) in this This section could allow a remote attacker using a specially crafted PAC file to execute arbitrary code as part of a privileged process. "PAC files are simple form of text files with JavaScript code that defines how Web browsers can automatically select an appropriate proxy server to retrieve a URL. The attacker uses the same thing to instruct the browser to transmit a usage of r traffic to a proxy server.

 Google corrects 11 critical exploits in the mobile operating system "title =" Google corrects 11 critical exploits in the mobile operating system "data- cl-slideshow = "" data-cl-title = "Google corrects 11 critical exploits in the mobile operating system" data-cl-description = "" data-cl-imageid = "52056-1" src = " / img / loading.gif "onload =" pagespeed.lazyLoadImages.loadIfVisibleAndMaybeBeacon (this); "onerror =" this.onerror = null; pagespeed.lazyLoadImages.loadIfVisibleAndMaybeBeacon (this); "/> </figure>
</div>
<p></strong></p>
<p>  Google also found that about two dozen vulnerabilities were related to Qualcomm system components, including the most serious vulnerability (CVE-2018). -5872) allowed nearby attackers to execute arbitrary code as part of a privileged process. "Qualcomm added that the exploit is also linked to an open-source WLAN component. </p>
<div id=

stay informed about the latest technological developments, follow GizBot on Twitter Facebook, YouTube and subscribe to our notification.

[ad_2]
Source link