Questions tagged [stagefright]

A vulnerability in the multimedia library libstagefright.so in Android allows for remote code execution on the device via MMS.

Stagefright is a vulnerability utilizing several bugs in the libstagefright.so library. These bugs are reported as CVEs, and can be found here:

The vulnerability works by crafting a malicious video file, and texting it to the victim. The victim's Android device will then try to preprocess that video file when received. A weakness in this processing routine enables the video file to execute malicious code. (Major Flaw In Android Phones Would Let Hackers In With Just A Text)

13 questions
64
votes
4 answers

How can common users defend against the StageFright vulnerability?

I was just informed of the StageFright vulnerability in Android devices. A specially crafted MMS message can gain access to data on the phone; so presumably it's a buffer overflow with subsequent privilege escalation. Details have not yet been…
S.L. Barth
  • 5,486
  • 8
  • 38
  • 47
57
votes
2 answers

How exactly does the Stagefright Vulnerability work on Android?

Digital Trends describes the Stagefright Vulnerability thus: The exploit in question happens when a hacker sends a MMS message containing a video that includes malware code. What’s most alarming about it is that the victim doesn’t even have to open…
PositriesElectron
  • 1,595
  • 1
  • 13
  • 17
6
votes
1 answer

Is it unsafe to restore backed up data from Google servers?

I have an Android smartphone that I don't trust. It has an old version of Android and has been vulnerable to Stagefright and a host of a hundred other vulnerabilities for months. Although there is no clear sign of compromise, because of the number…
n00b
  • 445
  • 2
  • 13
5
votes
1 answer

Would the Stagefright vulnerability existing in Android be able to run on other phones?

I saw a question about Android's "Stagefright" vulnerability, and I got to thinking: other OS'es pre-process MMS messages to make it easier to view. iOS does it and shows a preview. Even BREW OS (the OS that comes with a basic flip/slider phone) has…
DDPWNAGE
  • 195
  • 7
4
votes
1 answer

Android Stagefright Google Zero Day Exploit doesn't run. How to fix?

Exploit is posted here, however it is missing several things, for example shellcode and it binds to localhost for exploitation, cannot access it from Android device when started on my computer. I modified the two in my version. To run the exploit I…
dev
  • 937
  • 1
  • 8
  • 23
2
votes
0 answers

How to manually download an MMS without opening?

I'm looking into a potential Stagefright attack on an Android mobile (AOS 5.+). But since I'm not an expert on the subject, I fail to find a simple way to safely download the MMS for inspection. I was hoping to find a way to setup (the APN) proxy…
not2qubit
  • 275
  • 2
  • 8
2
votes
1 answer

Stagefright - building ROP stack - pivoting

Here I control r2 (vtable) 0xb6712c48 <+7120>: ldr r5, [r2, #28] 0xb6712c4a <+7122>: ldrd r2, r3, [r8] 0xb6712c4e <+7126>: blx r5 How I understand it: I control the r2 register (vtable), it loads an offset value off of r2 (28 bytes)…
dev
  • 937
  • 1
  • 8
  • 23
2
votes
2 answers

Stagefright on Samsung Galaxy S3 running JB 4.3

I've been doing a lot of research on Stagefright lately and it has been confirmed that many phone models running Android Lollipop and below are susceptible to the exploit. So since my S3 did indeed turn out to be vulnerable to the exploit having…
Ahmed K.
  • 23
  • 3
2
votes
1 answer

SELinux Privilege Escalation Metasploit Nexus 5 Android 5.0.1 LRX22C after Stagefright

I am preparing a part of a security awareness day and one part of the "show" should be about mobile security. I thought about showing the stagefright exploit. So I started with getting a mobile phone beeing supported by the latest stagefright-module…
2
votes
0 answers

Attempting Android Stagefright on Virtual Software

Does anyone know how I can exploit an android vm using stagefright? I can't use the android AVK because it doesn't support MMS.
2
votes
2 answers

CVE-2015-3864 - Android Stagefright - how Integer Overflow happens here?

I am trying to understand how "Integer Overflow" happens here and how it works. The vulnerability exists in the chunk of “tx3g”. Chunk_size is the unit which overflows the sum of size. That's to say, the memory assigned is less than the size. Thus…
dev
  • 937
  • 1
  • 8
  • 23
0
votes
1 answer

Is it safe to check if device is subject to Stagefright bug?

Is it safe to check if device is subject to Stagefright bug, for example with: Stagefright Detector App forAndroid by Zimperium ? Is such (or similar test) sufficient? Is there available any 3rd party external manual (e.g. in for of report with…
-2
votes
1 answer

How to check if your phone got hacked

Since the Stagefright exploit is very common on many devices I wanted to ask if there is any way to check if someone has used this exploit on a given device. Like check the processes for unknown entries, check the battery statistics for strange…
Thanathan
  • 782
  • 6
  • 16