fbpx

MFFA – Media Fuzzing Framework for Android

The main idea behind this project is to create corrupt but
structurally valid media files, direct them to the appropriate software
components in Android to be decoded and/or played and monitor the
system for potential issues (i.e system crashes) that may lead to
exploitable vulnerabilities. Custom developed Python scripts are used
to send the malformed data across a distributed infrastructure of
Android devices, log the findings and monitor for possible
issues, in an automated manner. The actual decoding of the media files
on the Android devices is done using the Stagefright command line
interface. The results are sorted out, in an attempt to find only the
unique issues, using a custom built triage mechanism.


 

 

 

Some results – vulnerabilities discovered

  • Multiple integer overflows in Stagefright code (libstagefright SampleTable):
    • CVE-2014-7915
    • CVE-2014-7916
    • CVE-2014-7917
  • A crafted MPEG4 media file can result in heap corruption in
    libstagefright, that can lead to arbitrary code execution in the
    mediaserver process:

    • CVE-2015-3832

 Download and read more at:

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...