Skip to content
Naked Security Naked Security

Android’s Stagefright is back! Here’s what you need to know

Exploit code for the Stagefright vulnerability is now public. But it's not all bad news: we explain the risk and how to avoid it...

The Android vulnerability known as Stagefright is back in the limelight.

Stagefright is a bug, or more accurately a series of similar bugs, in an Android programming library called libstagefright.

Libstagefright is part of the operating system that handles media files such as movies.

If you receive an MMS (Multimedia Messaging Service) message that links to a video, or watch a clip embedded in a web page, or download a video for later, your Android will probably load up and use the libstagefright software to play the file.

Researchers at Zimperium found a number of memory corruption bugs in the libstagefright code, and prepared a paper for the recent Black Hat conference to talk about them.

Presentations at Black Hat that deal with vulnerabilities in widespread devices often get a lot of publicity before the event, and with Zimperium claiming that some 950,000,000 Androids might be at risk, Stagefright got more publicity that most.

Eventually, Zimperium didn’t release any actual exploits at Black Hat, giving the Android ecosystem a bit more time to get its patches tested and shipped.

Public exploit code

But that was a month ago, and the company has now decided to wait no longer.

Zimperium has published a Python program that generates booby-trapped .MP4 movie files, apparently to help you test whether your device is patched.

The bad news is that the “test” program doesn’t merely prove that you have an exploitable Android, for example by popping up the Android calculator program without asking.

(Running CALC.EXE is a standard proof-of-concept in the Windows world.)

The test program produces a movie file exploit that calls home to an internet address you specify when you create the file, and gives you a command shell on the victim’s Android device.

→ This sort of exploit is known as a “reverse shell” – reverse because the attacked computer connects to you, rather than you logging in to it; shell because that’s the Unix-flavoured name for a command prompt.

So, as much as Zimperium’s Python script is a proof-of-concept, it’s also, strictly speaking, a Remote Access Trojan creation kit. (Sophos Anti-Virus detects them as Exp/20151538-A.)

The good news is that the exploit seems, at best, to be device specific.

At any rate, the blog article says that:

This exploit has several caveats. First, it is not a generic exploit. We only tested it to work on a single device model. We tested this exploit on a Nexus running Android 4.0.4. Also, due to variances in heap layout, this is not a 100% reliable exploit by itself. We were able achieve 100% reliability when delivered through an attack vector that allowed multiple attempts. Finally, this vulnerability was one of several that was neutered by GCC 5.0’s ‘new[]’ integer overflow mitigation present on Android 5.0 and later.

As we explained in a recent article about booby-trapped files (in that article we dealt with a Word-based attack rather than a movie-based one), modern exploits often rely on two tricks.

One is known as a spray, where the attacker knows he can crash your device, but is only able to aim control at a general area of memory.

So he pads out his attack code, or repeats it over and over, in the hope that when it is loaded by Word, or by libstagefright, or whatever, it’s a big enough target in a suitable place.

Padding or repeating your attack code is known as spraying memory, for obvious reasons.

But operating systems, both by accident and by design, don’t always allocate memory in a repeatable or predictable way.

The memory available for allocation to a program is known as the heap, and the heap layout will typically vary between different devices, between different versions of the operating system, and even between reboots.

As Zimperium points out, this greatly diminishes the chance that its proof-of-concept exploits will work in the real world without modification.

The second trick needed by many exploits, including Stagefright, is ROP, or Return Oriented Programming.

Thanks to DEP, or Data Execution Prevention, an attacker can’t blindly jump to exploit code he has sprayed onto the heap: it’s labelled as data, so trying to run it will fail and the exploit will be prevented.

So, the attacker needs to identify code fragments that are already in executable memory, and string them together as a precursor to his attack.

He then creates a list of the addresses at which these fragments are located, and jumps to them in turn.

→ On Intel processors, this “jumping” is usually done by an instruction called RET, short for short for return from subroutine, which is how Return Oriented Programming gets its name.

But recent versions of Android, along with every other modern operating system, has a feature called ASLR, or Address Space Layout Randomisation.

ASLR does what its name suggests: it loads the components of your program at a different place in memory every time.

Actually, for performance reasons, the locations typically change only when you reboot, but it nevertheless makes every user’s memory layout different.

ASLR is a great defensive tool against ROP, because it means that the list of code fragment addresses found by an attacker are often valid only on the attacker’s own test device.

When you send your exploit out into the real world, you may find that instead of making a series of pre-programmed turns that just happen to lead onto the freeway, you end up crashed into a hedge or stuck in a ditch.

What’s the risk?

ASLR and the vagaries of the heap notwithstanding, the vulnerabilities found by Zimperium are real.

Even exploited inexpertly, they could be used by malcontents to crash important programs on your device.

A denial-of-service attack is generally less of an issue that outright remote code execution, but it can still cause serious problems, especially if the attacker repeatedly crashes a program you rely upon to do your job.

And, as the Zimperium proof-of-concept shows, remote code execution due to the Stagefright bugs is technically possible, no matter that it’s unlikely.

There’s also the thorny problem that many Androids are configured to download and display MMS messages by default.

In other words, someone you don’t know can attack you via Stagefright without having to talk you into visiting his website or downloading his booby-trapped file.

He can simply send you one or more MMSes that link to booby-trapped movie files, and your phone will process them in the background.

And one way around ASLR and heap variation is to try the same attack over and over again, adjusting the addresses that you wire into your exploit every time.

That doesn’t guarantee success, but it certainly improves the chances that your attack may just happen to line up with the memory layout on the victim’s computer.

What to do?

 

• Get patched as soon as your vendor or carrier provides an update. If you’re not sure, ask.

• Make sure third-party apps that can play videos (e.g. Firefox) are up-to-date, too.

• Avoid downloading media files “just to take a look.”

• Avoid clicking through to websites “just to take a look.”

• Don’t accept MMS messages from unknown senders.

• Turn off the “automatically download MMS messages” option.

To learn how to how to turn off auto-retrieval of MMSes, please see our earlier article about Stagefright.

2 Comments

As usual, what about the “orphan” devices? They’re still perfectly functional, but abandoned by their manufacturers or carriers. AOSP did the ecology and owners a huge disservice by not including a 10-year maintenance clause in the open-source agreement.

Reply

In this context, “orphan devices” translates to practically all devices. My Nexus 5 is fully patched, but only because I refashed it three days ago using an only just released firmware image that google published on a developer website about 5 days ago.

https://developers.google.com/android/nexus/images

Other Nexus users, who got there device direct from Google can also patch their devices if they are willing to use developer tools to reflash their devices, but if you have a non nexus device, even if it is very new, then you are probably out of luck for a couple of months at least.

In other words, the whole thing is a security fiasco, waiting to be exploited by any bad actor who cares to. The only good thing is that it might give Google the ammunition it needs to force other manufactures and networks to bring in a sane and quick patching process, so that patches for other security issues can be pushed out to users quickly.

Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to get the latest updates in your inbox.
Which categories are you interested in?
You’re now subscribed!