Samsung began rolling out the May 2020 security patch last week. The security patch fixes the “critical” remote code execution (RCE) bug on all Samsung mobiles sold since 2014. The security flaw remains in Samsung devices handling of the Samsung Qmage image format (.qmg) which is processed by Android’s graphics library. Skia. This security flaw can be used in a zero-click scenario, which means it can operate without users’ knowledge or with any type of interaction with the device. Meanwhile, Samsung has accepted the security issue and included improvements to its May security update. However it is uncertain whether the fix will be rolled out on all affected devices, and we have reached out to the company for clarity on qualified devices.
What is a security flaw?
Security flaw describes how Samsung device interacts with Qmage image format Indicated by Mateusz Jurczyk was a security researcher and first with Google’s Project Zero bug-hunting team Reported By ZDNet. According to Jurczyk, once A. Samsung The user receives an image file through the Samsung Messages app, redirecting all images to the Scia library for Android processing. However, image files with the .qmg format can be exploited as it can reveal the position of the scia library in the phone’s memory. The research further states that 300 MMS messages are required to test and bypass Android’s Address Space Layout Randomization (ASLR) protection. The entire process of locating the Skia library usually takes about 100 minutes.
What happens after the Skiya library is located?
According to Jurczyk, once the Skia library is traced to a Qmage file (in this case via files obtained on the Samsung Messaging app), the hacker can execute the code without the user’s interaction with the device. As the hacker benefits here, Jursky signals that the attacker gains access to the entire information of various users, including call logs, contacts, microphones, storage, SMS messages and more.
“After reporting the crash, I spent several weeks working on a 0-click MMS exploit proof-of-concept for one of the many vulnerabilities. I achieved this on Android 10. with a Samsung Galaxy Note 10+ phone did.” The process of locating the Scia library on a Samsung device was also demonstrated Video By security researcher.
Samsung smartphones started supporting the custom Qmage format on all devices released since late 2014. Samsung is said to be the only manufacturer affected by the bug, as it is reportedly the only one that modifies the Android OS on its devices to support the Qmage format, developed by the South Korean firm Kuramsoft.
What is Samsung saying?
Although Samsung has not released a statement regarding the Qmage security flaw, the company is still releasing updates to fix the problem. Recently, Samsung Galaxy S20 Series Received May 2020 security patch that fixes a zero-click vulnerability dubbed as SVE-2020-16747. May bug found it On the Samsung security bulletin that listed it as a “significant” problem. It describes it as “Kurum allows possible remote overwritten code execution to overwrite potential memory in the qmg library”. As mentioned, it is uncertain which devices will receive the fix, and we have reached this front for clarity.
Is the Mi 10 an expensive OnePlus 8 or a budget S20 Ultra? We discussed it Of class, Our weekly technology podcast, which you can subscribe through Apple Podcast or RSS, Download episode, Or simply hit the play button below.