Stagefright 2.0 Exploits Android Vulnerabilities
Comments Off on Stagefright 2.0 Exploits Android Vulnerabilities
Newly found vulnerabilities in the way Android handles media files can allow attackers to compromise devices by tricking users into visiting maliciously crafted Web pages.
The vulnerabilities can lead to remote code execution on almost all devices that run Android, starting with version 1.0 of the OS released in 2008 to the latest 5.1.1, researchers from mobile security firm Zimperium said in a report published Thursday.
The flaws are in the way Android processes the metadata of MP3 audio files and MP4 video files, and they can be exploited when the Android system or another app that relies on Android’s media libraries previews such files.
The Zimperium researchers found similar multimedia processing flaws earlier this year in an Android library called Stagefright that could have been exploited by simply sending Android devices a maliciously crafted MMS message.
Those flaws triggered a coordinated patching effort from device manufacturers that Android’s lead security engineer, Adrian Ludwig, called the “single largest unified software update in the world.” It also contributed to Google, Samsung and LG committing to monthly security updates going forward.
One of the flaws newly discovered by Zimperium is located in a core Android library called libutils and affects almost all devices running Android versions older than 5.0 (Lollipop). The vulnerability can also be exploited in Android Lollipop (5.0 – 5.1.1) by combining it with another bug found in the Stagefright library.
The Zimperium researchers refer to the new attack as Stagefright 2.0 and believe that it affects more than 1 billion devices.
Since the previous attack vector of MMS was closed in newer versions of Google Hangouts and other messaging apps after the previous Stagefright flaws were found, the most straight-forward exploitation method for the latest vulnerabilities is through Web browsers, the Zimperium researchers said.
Zimperium reported the flaws to Google on Aug. 15 and plans to release proof-of-concept exploit code once a fix is released.
That fix will come on Oct. 5 as part of the new scheduled monthly Android security update, a Google representative said.
Source-http://www.thegurureview.net/mobile-category/stagefright-2-0-exploits-android-vulnerabilities.html
Amazon Debuts Cloud-based Transcoding Service
Comments Off on Amazon Debuts Cloud-based Transcoding Service
Amazon Web Services has rolled out the option to use its Elastic Transcoder for audio-only conversions.
Amazon Elastic Transcoder was developed to offer an easy and low-cost way to convert media files from their source format into versions that will play on devices like smartphones, tablets and PCs.
The new feature lets anyone use Amazon Elastic Transcoder to convert audio-only content like music or podcasts from one format to another. Users can also strip out the audio tracks from video files and create audio-only streams. An option that, for example, can be used to create podcasts from video originals that are compatible with iOS applications that require an audio-only HTTP Live Streaming (HLS) file set, Amazon said.
The output from Elastic Transcoder is two-channel AAC, MP3 or Vorbis. Metadata like track name, artist, genre and album art is included in the output file and users can also specify replacement or additional album art.
Users of the service pay for the length of their converted content. For audio-only transcoding, prices start at $0.0045 per minute. That compares to the video version, which costs from $0.015 per minute for standard definition content and $0.03 per minute for high-definition clips, according to Amazon’s website.
For users who want to try out the service, the AWS Free Tier offers up to 20 minutes of free audio output per month. The service was announced for video in January and is still tagged as a beta.