This weekend, XDA-Developers member alephzain discovered a serious security breach on Note 2, Galasy S3, Galaxy S2 and other Samsung devices incorporating Exynos – 4210 and 4412 processor, including tablets. The security flaw was called the Exynos root exploit and happens in the core of the operating system, the device kernel.
The security breach provides access to all physical memory of the devices. Thus, you can root the device without using ODIN flashing, which makes the device root easy, but gives you no control over it, leaving the device exposed to malicious applications, as it offers no restrictions on reading and writing permissions. That is basically Any application installed on the device can obtain root access permissions (even if the device does not provide root access) and perform any operation on your phone.
Here is the list of devices affected by this security hole:
Exynos 4210 Appliances
- Galaxy Note GT-N7000
- Galaxy S2 GT-I9100
- AT&T Galaxy S2 GT-I777
Exynos 4412 Appliances
Samsung has not yet commented on the security breach, but thanks to the Supercurium, a tool has been made available to temporarily fix the problem. The application works without the need for root access to the device, determines if the device may be affected by the problem and blocks the chances of it happening. The tool itself does not change the system and can easily be turned on and off. If enabled, however, it has front camera bugs and HDMI output. So while we await a move by Samsung, it is a temporary option for those who do not have root access.
Before finishing this article, the page with the tool created by XDA-Developers member, Supercurio, fell due to the number of hits. Meanwhile, here follows another possibility of protection, the Exynos Mem Bug Checker application. Well, this is not a good start to the weekend for Samsung's top-end device users.
(tagsToTranslate) root exploit exynos (t) samsung (t) s3 (t) s2 (t) note (t) note 2 (t) security hole