A few months earlier, web researchers located a significant issue at the core of Android which is reported to open up a fault in the way of Android that allows remote code execution before a pernicious record had even been opened.
However, after reporting the issue, Android’s security group fixed the underlying bug within a couple of weeks, yet it propelled a rush of new assaults in transit Android forms the sound and video records. Now it has come to notice that, Android recently held another fixing which discharged today, fixes three separate vulnerabilities in Android’s media-handling capacity, including one fundamental defect that could be utilized for remote code execution.
According to the recent report, Android is working on rebuilt of its Android core. Google in last month announced the rolling out of Android 7.0 Nougat with a rebuilt media playback system, which is particularly outlined to shield against the Stagefright vulnerability. Google today has posted a blog in which it mentioned that Android’s security team has rebuilt the Nougat security ad fixed several bugs which are found in the last upgrade.
In the Blog post, Google said that the update of Nougat allowed the developer team to revamp that framework starting from the earliest stage, detaching the Stagefright imperfections at the root. To begin, the group adjusted mediaserver to check for the possibilities of vulnerability in advance, keeping the attack that is at the core of Stagefright.
The Stagefright assaults is outlined by keeping the focus on Android’s “mediaserver” system, which is a center capacity that applications approach to render sound or video. If media is sent over MMS or Hangouts, that can happen before you see a warning, as applications get information to create a sneak peak or preload segments of the document.