Новости компьютерной безопасности:

  Latest News

Critical Samsung 0-Click Vulnerability Found in Samsung S24 and S23 Devices Got Fixed

С сайта: Vulnerability(cybersecuritynews.com)

Critical Samsung 0-Click Vulnerability Found in Samsung S24 and S23 Devices Got Fixed

Author: Balaji N

On September 21, 2024, a critical security vulnerability was identified by Google researchers in the Monkey’s Audio (APE) decoder used in Samsung’s flagship Galaxy S23 and S24 devices.

Now it got fixed after 3 months since the Google Project Zero team disclosed the vulnerability with a 90-day deadline.

The latest update addresses critical vulnerabilities within the Android operating system, incorporating essential security patches from both Google and Samsung.

Notably, it resolves CVE-2024-49415, which impacted Android versions 12, 13, and 14 allow allows remote attackers to execute arbitrary code.

The flaw, which involves an out-of-bounds write in the libsaped.so library, could allow malicious actors to crash the system process or potentially exploit the issue further, leading to serious consequences.

Vulnerability Details
The issue lies in the saped_rec function of the libsaped.so library. This function writes data into a DMA buffer allocated by the C2 media service.

“While the buffer has a fixed size of 0x120000, the function can write up to three times the maximum allowable size under certain conditions. Specifically, when processing APE files with a large blocksperframe value and 24-bit input samples, the buffer is significantly exceeded, causing memory corruption.” Google researchers explained.

This bug is particularly alarming because it can be remotely triggered without user interaction—a “0-click” vulnerability.

On Samsung devices, Google Messages is configured to use Rich Communication Services (RCS) by default. This configuration means that if a malicious APE audio file is sent as an RCS message, the system could attempt to transcribe the file without any user involvement. This action would lead to a crash in the target device’s C2 process.

Researchers have demonstrated methods to reproduce the crash locally and remotely:

  • Local Reproduction :

  1. Transfer the malicious APE file (overflow.ape) to the device.
  2. Play the file using the “My Files” application.

  • Remote Reproduction :

  1. Set up a test device to send RCS messages to the target Samsung phone.
  2. Replace the RCS media cache file with the malicious APE file.
  3. Send an audio message to the target device.

Upon receiving the malicious file, the target device’s C2 service crashes, generating debug logs that confirm the buffer overflow. The relevant process crash details include a SIGSEGV (segmentation fault) in the saped_rec function of the libsaped.so library.

The vulnerability is highly concerning due to its 0-click nature, allowing attackers to target devices without requiring any user action. While it is unclear if the bug is exploitable beyond crashing the process (e.g., executing arbitrary code), it remains a serious risk, especially given the memory corruption involves adjacent DMA and non-DMA data.

Samsung Galaxy S23 and S24 devices are confirmed to be affected, with no evidence yet of other Samsung models or Android phones being impacted.

The vulnerability was reported subject to Google’s Project Zero disclosure policy, which provides vendors 90 days to release fixes before making the issue public.

If the fix is deployed before the deadline, the details will become public after 30 days. The disclosure deadline for this issue is set for December 19, 2024 , unless a patch is released earlier.

Google Project Zero’s disclosure policies aim to encourage swift resolutions to critical flaws while enhancing user security.

Google advised the user to apply the following steps: Until a patch is released, users are advised to:

  • Disable RCS messaging if it is unnecessary.
  • Avoid opening or playing untrusted audio files through messaging apps or file browsers.
  • Apply security updates from Samsung as soon as they are available.

The Fix
At the recent Samsung patch update, among the critical vulnerabilities identified, five Common Vulnerabilities and Exposures (CVE) have been prioritized for immediate attention. including this 0-click vulnerability:

  • CVE-2024-43096
  • CVE-2024-43770
  • CVE-2024-43771
  • CVE-2024-49747
  • CVE-2024-49748

These vulnerabilities pose significant risks as they enable attackers to execute arbitrary code, potentially leading to unauthorized access to sensitive information and control over affected devices.

This vulnerability underscores the risks of modern smartphone ecosystems where media handling services and messaging protocols introduce new attack vectors. Users are encouraged to stay vigilant and ensure their devices are updated with the latest security patches.

Find this News Interesting! Follow us onGoogle News,LinkedIn, andXto Get Instant Updates!



#Cyber_Security_News #Vulnerability #Vulnerability_News #cyber_security_news #vulnerability

Оригинальная версия на сайте: Critical Samsung 0-Click Vulnerability Found in Samsung S24 and S23 Devices Got Fixed
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.