{"id":3415,"date":"2020-05-07T19:11:59","date_gmt":"2020-05-07T17:11:59","guid":{"rendered":"http:\/\/plus.maciejpiasecki.info\/index.php\/2020\/05\/07\/samsung-finally-patches-a-zero-click-vulnerability-that-existed-since-2014\/"},"modified":"2020-05-07T22:57:50","modified_gmt":"2020-05-07T20:57:50","slug":"samsung-finally-patches-a-zero-click-vulnerability-that-existed-since-2014","status":"publish","type":"post","link":"https:\/\/plus.maciejpiasecki.info\/index.php\/2020\/05\/07\/samsung-finally-patches-a-zero-click-vulnerability-that-existed-since-2014\/","title":{"rendered":"Samsung Finally Patches A Zero-Click Vulnerability That Existed Since 2014"},"content":{"rendered":"<p>With the May 2020 Android security patch, Samsung has fixed a critical zero-click vulnerability that impacted all its smartphones sold since 2014. The security flaw exploited how the company&#8217;s Android skin handles the 'Qmage&#8217; image format (.qmg).<br \/>\nQmage is a custom image format developed by South Korean company Quramsoft. Samsung started supporting .qmg files in its Galaxy smartphones since 2014. The company reportedly uses them in Samsung Themes.<br \/>\nHowever, that implementation apparently had serious vulnerabilities. Mateusz Jurczyk, a security researcher working with Google&#8217;s Project Zero bug-hunting team, recently discovered a way to exploit it (via ZDNet).<br \/>\nThe vulnerability exploits how Skia (Android&#8217;s graphics library) handles .qmg images sent to a Samsung smartphone. The bug can be exploited in a zero-click scenario, which means it doesn&#8217;t need any user interaction.<br \/>\nSamsung fixes the zero-click vulnerability with May 2020 update<br \/>\nThe Android OS redirects all images received by the device to the Skia library for processing and generating thumbnail previews. This happens without a user&#8217;s knowledge.<br \/>\nJurczyk could exploit the bug by sending repeated MMS messages to Samsung phones. Since those images are redirected to the Skia library, he could guess the position of the library in the device&#8217;s memory.<br \/>\nKnowing the location of the Skia library means he could then bypass Android&#8217;s ASLR (Address Space Layout Randomization) protection. Once the library was located, one more MMS containing a Qmage file is sent to the phone. This file would then execute the attacker&#8217;s code on the device.<br \/>\nJurczyk says it takes anywhere between 50 and 300 MMS messages to exploit this vulnerability. The process takes about 100 minutes on average. The bug can be exploited through any app that can receive Qmage images, including Samsung&#8217;s Messages app.<br \/>\nThe researcher could even get MMS messages fully processed by the Skia library without triggering a notification sound. So fully stealth attacks are very much possible.<br \/>\nJurczyk discovered and reported the vulnerability to Samsung in February. The South Korean company eventually patched it with the May 2020 Android security update.<br \/>\nThe May security maintenance release for Samsung smartphones also contains fixes for 18 other Samsung Vulnerabilities and Exposures (SVE), the vulnerabilities that are exclusive to Samsung&#8217;s custom Android skin. In addition, it also fixes nine critical and dozens of high and moderate-risk Android OS vulnerabilities.<br \/>\nSamsung started rolling out the May 2020 Android security update last week. The update has so far been released for the Galaxy S20,\u00a0Galaxy Fold,\u00a0Galaxy Note 10,\u00a0Galaxy S10, Galaxy Z Flip, and the Galaxy A50 phones. It should also be available to other eligible Galaxy smartphones in the coming weeks.<\/p>\n<p>The post Samsung Finally Patches A Zero-Click Vulnerability That Existed Since 2014 appeared first on Android Headlines.&#013;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/plus.maciejpiasecki.info\/wp-content\/uploads\/2020\/05\/Samsung-Galaxy-S20-Ultra-Review-AM-AH-16.jpg\" width=\"1600\" height=\"1200\">&#013;<br \/>\nSource: ndroidheadlines.com&#013;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the May 2020 Android security patch, Samsung has fixed a critical zero-click vulnerability that impacted all its smartphones sold [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":3416,"comment_status":"false","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3415","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bez-kategorii"],"_links":{"self":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/3415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/comments?post=3415"}],"version-history":[{"count":1,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/3415\/revisions"}],"predecessor-version":[{"id":3417,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/3415\/revisions\/3417"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media\/3416"}],"wp:attachment":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media?parent=3415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/categories?post=3415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/tags?post=3415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}