Android update from Seven other flaws in different software libraries are the most concerning, all allowing remote control execution, where hackers can send multimedia messages or emails to launch their attacks.
The cyber security team was credited with finding six bugs in the ‘mediaserver’ component of Android, which processes media files, making up one critical issue. As there are many services that rely on media servers, such as MMS messages and browser playback of videos and music, a hacker could send exploit code for the bugs via those services. Much like with the original Stagefright, anyone exploiting the vulnerabilities could access a users’ audio and video streams, possibly via a single, silent text.
The other critical bug was in the “libutils” library, another core part of the Android operating system and the same component exploited in the recently-disclosed . Again, libutils deals with MMS and browser playback of media, meaning an attacker successfully exploiting the flaw could access the audio and video.