Remember Stagefright, the Android vulnerability that affected nearly 1 billion phones running Android versions from 2.2 to 5.1? Well, you may have heard that it’s back — and it’s even nastier than before.
Where the first version of the vulnerability could be accessed via an MMS message, Stagefright 2.0 can travel via specially adapted and apparently innocuous MP3/MP4 files — and those files can be stored inside apps, so just avoiding freebie music or movie files won’t protect you.
The most important thing about Stagefright isn’t what it does or how it travels, though. It’s what it shows. And what it shows is that there is a massive security problem that affects almost every Android device, and Google needs to solve it – because there’s every chance that the next vulnerability will be much more devastating.
All the world’s a Stagefright
Here’s how security vulnerabilities are supposed to be handled. One, a researcher discovers an issue. Two, the people who make the software find a solution. And three, the solution is then made available, ideally by automatic update. That’s what Windows does, and what Apple does. It isn’t always as fast as it should be, but at least once the fix exists it’s available almost instantly.
Here’s how it works with Android.
-
A researcher discovers a vulnerability.
-
Google says “la la la can’t hear you” for a year or so.
-
After lots of media coverage Google says it’ll fix the hole.
-
Google creates a fix and promises to bring it to the Nexus range in two or three months.
-
Google gives the fix to manufacturers who say they’ll roll it out at some point, maybe, when they get round to it.
-
The manufacturers get round to it and submit their version to the phone networks, who say they’ll totally bring it out at some point, oh yes siree!
-
The vulnerability that the fix will eventually fix evolves so that the fix doesn’t fix it any more.
-
Google says “la la la can’t hear you”.