Avira Antivirus Security for Android – Version 4.0

Previously discovered bugs have been successfully fixed in the latest version and new features have also been added to the application. You can now lock the applications you use on your mobile devices thanks to the new App Lock feature.

It’s all about performance and security

Although several improvements can be noticed in the design of the interface, most of the updates referred to internal processes and they were aimed at offering Android users the best possible protection. The latest version of Avira Antivirus Security also makes it easier for users to upgrade to the Pro version and thus benefit from a Secure Browsing experience on their Android devices.

Mobile applications secured with Avira’s App Lock

Officially released within the newest version of Avira Antivirus Security for Android, the App Lock feature enables users to protect their mobile apps against unauthorized usage by simply blocking access to them. This comes as an extra layer of protection highly welcomed for apps known to store precious data such as personal information, photos, videos or any other type of sensitive content.

“Our Mobile Development team is proud to offer Android users more than an antivirus application for their devices, an app that treats all privacy aspects equally serious. Data theft can occur under many forms and it is our duty to help the user benefit from extra layers of protection for all sensitive data. The updates in the latest Avira Antivirus Security version, such as the new App Lock feature, work exactly towards this goal: enhanced protection with no extra costs” said Cornel Balaban, Mobile Development Manager at Avira.

FREE Avira Antivirus Security for Android Version 4.0 is available for download in the Google Play Store

Let us know what you think about the latest updates and what future changes you would like to see in our app: https://play.google.com/store/apps/details?id=com.avira.android

The post Avira Antivirus Security for Android – Version 4.0 appeared first on Avira Blog.

CVE-2012-2808 (bionic)

The PRNG implementation in the DNS resolver in Bionic in Android before 4.1.1 incorrectly uses time and PID information during the generation of random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2015-0800.

CVE-2015-0800 (firefox)

The PRNG implementation in the DNS resolver in Mozilla Firefox (aka Fennec) before 37.0 on Android does not properly generate random numbers for query ID values and UDP source ports, which makes it easier for remote attackers to spoof DNS responses by guessing these numbers, a related issue to CVE-2012-2808.

CVE-2015-0802 (firefox)

Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.

CVE-2015-0803 (firefox)

The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element’s attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document.

CVE-2015-0804 (firefox)

The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document containing a SOURCE element.

CVE-2015-0805 (firefox)

The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 makes an incorrect memset call during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors that trigger rendering of 2D graphics content.

CVE-2015-0806 (firefox)

The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors that trigger rendering of 2D graphics content.

CVE-2015-0807 (firefox, firefox_esr, thunderbird)

The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.