![]() ![]() ![]() You can click through the source link down at the bottom for all the technical details, but the short version is that any app can hand SHAREit a bit of code to trigger further arbitrary execution of code by the app, also allowing it to read and write from the app's siloed storage. Developers of the app, which claims over a billion installs at the Play Store, were notified of the vulnerability three months ago, but according to Trend Micro, they haven't done anything to address it. The technical details are a bit of a slog, but in short, the app could indirectly allow for the execution of arbitrary code remotely, read or overwrite the app's local files, or even allow for third-party APKs to be installed. ![]() The popular SHAREit app isn't just set to be banned in the US in the next three days it was also apparently vulnerable to a (slightly convoluted) attack. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |