Featured Articles

AMD SVP John Byrne named turnaround exec of the year

AMD SVP John Byrne named turnaround exec of the year

Director of AMD’s PR Chris Hook has tweeted and confirmed later in a conversation with Fudzilla that John Byrne, Senior Vice…

More...
Shield Tablet 8 launching on Tuesday July 22nd

Shield Tablet 8 launching on Tuesday July 22nd

We knew the date for a while but as of right now we can confirm that Nvidia’s new Shield Tablet 8,…

More...
AMD confirms 20nm in 2015

AMD confirms 20nm in 2015

Lisa Su, Senior Vice President and Chief Operating Officer, AMD, has confirmed what we told you back in May 2014 – …

More...
AMD reports loss, shares tumble

AMD reports loss, shares tumble

AMD’s debt load is causing huge problems for the chipmaker -- this quarter it had another substantial loss. The tame Apple Press…

More...
AMD A8-7600 Kaveri APU reviewed

AMD A8-7600 Kaveri APU reviewed

Today we'll take a closer look at AMD's A8-7600 APU Kaveri APU, more specifically we'll examine the GPU performance you can…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 17 December 2012 09:56

Exploit found in Exynos 4 chips

Written by Fudzilla staff

Allows attackers to access RAM

An XDA forum member has apparently managed to identify a serious security flaw in some Samsung Exynos chips.

The vulnerability is in the kernel and it allows attackers to bypass system permissions and gain access to RAM, or just inject malicious code into the kernel. So it has all the makings of a bad day for affected users.

The flaw affects Exynos 4 chips and the new Exynos 5 does not appear to be affected. The developer who identified the vulnerability says it is easy to obtain root access on affected devices, with no control over it.

Affected devices include the Galaxy S III, Galaxy Note and Galaxy Note 2, along with Galaxy 10.1 tablets.

You can check out the geeky details here.

blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments