4.9 • 696 Ratings
🗓️ 14 August 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, August 15, 2016 edition of the San San Bernard Storm Center's Stormcast. |
0:07.9 | My name is Johannes Ulrich, and today I am recording from Stockholm, Germany. |
0:11.6 | Google released a statement regarding the quad-ruder vulnerability that was announced by Checkpoint about two weeks ago. |
0:20.7 | It's really a set of four distinct |
0:23.0 | pervage escalation vulnerabilities for Android phones that use Qualcomm chipsets. According |
0:29.0 | to Google the exploitability for this particular vulnerability is somewhat lessened |
0:36.0 | because the victim has to install an application |
0:39.3 | so it's not like the stage fright vulnerability where just for example downloading an |
0:44.1 | image in an ms.s message or so would trigger the vulnerability in addition whenever |
0:51.1 | you do download an application it it goes through the Verify Apps feature |
0:58.0 | if you're running Android 4.2 and later. |
1:02.4 | And in this case, the Verify apps would detect the exploit and would block the application, |
1:10.5 | not giving the user the option to bypass the warning. |
1:14.6 | Verify apps has sort of two levels of detection. |
1:18.6 | At the lower level, it just suggests that the application may harm the system or may harm the phone |
1:25.6 | and it will still allow the user to overwrite the warning, |
1:29.9 | but in this case the more strict warning would be triggered, which cannot be bypassed. |
1:36.3 | And this is a default setting, so the user would have to specifically disable verify apps. |
1:42.7 | In addition, Google notes that three out of the four vulnerabilities are already addressed |
1:49.0 | in the most recent version of Android, the remaining fourth vulnerability should be addressed |
1:56.0 | in an update that will be released shortly. |
2:00.0 | So in short, Google probably rightfully so does object somewhat to the hype that the checkpoint |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.