Jump to content


Photo

Another Ugly Android Security Vulnerability


  • Please log in to reply
8 replies to this topic

#1 mjs27541

mjs27541

    I have no idea what's going on...

  • News Writer
  • PipPipPipPip
  • 1,276 posts
  • LocationSouthern MD
  • Current Device(s):LG G2

Posted 29 July 2014 - 07:53 AM

Please Login or Register to see this Hidden Content

 

Please Login or Register to see this Hidden Content

  13.99KB   24 downloads

 

You really didn't think that my first story in over a month would be good news did you?!?  Researchers at Bluebox have discovered a security vulnerability within Android that could allow malicious code to infect nearly any app on your device.  In a nutshell, Android allows for a variety of security certificates that verify the authenticity of an app, including self-signed certificates that aren't issued by a digital certificate authority.  However, there is another type of certificate, referred to as a hard-coded certificate, that gives the associated app elevated permissions, such as the ability to inject code into other apps.  The main three that have been referenced that use this type of certificate are Adobe, which most likely uses this to allow Flash to act as a plug in for other apps; 3LM, which is a service used on Motorola, Sony, HTC, Samsung, and LG devices among others that can install apps and control system settings; and Google Wallet, which uses the hard-coded certificate to provide secure access to NFC.  The problem is that Android does not verify the authenticity of the security certificates that act as intermediaries between the apps in which code is injected and the original hard-coded certificate that allowed the code to be injected in the first place.  So essentially, an attacker can sign a malicious app with a security certificate that appears to be signed by the original hard-coded certificate but actually isn't, and this will never be cross-checked by Android.  The bottom line is that this is yet another way in which an attacker can gain full access to your device and steal your personal stuff.  Google says they have released a patch to address this, with Motorola being the only manufacturer that has begun to push the patch out so far.  More details about the vulnerability, as well as a link to an app that can determine if your device is vulnerable, can be found

Please Login or Register to see this Hidden Content

.  

 

Source: PCWorld.com  



#2 SamuriHL

SamuriHL

    Android Warrior

  • Smod
  • 39,277 posts
  • Current Device(s):Pixel XL

Posted 29 July 2014 - 12:08 PM

It is patched in some builds of 4.4.4 and the RAZR HD latest soak test 4.4.2 build also has it patched.  But yea, this one's bad.  Very bad.


5uWEQs7.jpg

 

Non potest esse nisi unus

 


#3 RikRong

RikRong

    Cap'n Slow

  • Superuser
  • 2,117 posts
  • Twitter:@rlongjr80
  • LocationNoDak
  • Current Device(s):Pixel 5

Posted 29 July 2014 - 12:27 PM

Not even remotely related to the Razr, but I'm running Clean Rom (based on the latest VZW firmware) on my M8 and ran the test.  It said I'm vulnerable to FakeID.  Hopefully, someone will make a patch for XPosed, or HTC puts out a patch. ;)


R. Long: Pixel 5

 


#4 mjs27541

mjs27541

    I have no idea what's going on...

  • News Writer
  • PipPipPipPip
  • 1,276 posts
  • LocationSouthern MD
  • Current Device(s):LG G2

Posted 29 July 2014 - 03:35 PM

Its patched on the most recent CM11 nightly for the bionic. I'm not sure when the patch hit AOSP, but I'm sure that since its patched on the bionic, its patched on the vast majority of recent CM11 builds.

#5 strasber

strasber

    n00b

  • Members
  • Pip
  • 14 posts

Posted 29 July 2014 - 09:52 PM

my razr m 4.4.2 is vulnerable



#6 SamuriHL

SamuriHL

    Android Warrior

  • Smod
  • 39,277 posts
  • Current Device(s):Pixel XL

Posted 30 July 2014 - 02:59 AM

my razr m 4.4.2 is vulnerable


That's cause moto hasn't seen fit to launch the same soak build that the hd currently has for the m yet. I really don't get what moto is doing with that build.

Sent from my SM-P600 using Tapatalk


5uWEQs7.jpg

 

Non potest esse nisi unus

 


#7 RikRong

RikRong

    Cap'n Slow

  • Superuser
  • 2,117 posts
  • Twitter:@rlongjr80
  • LocationNoDak
  • Current Device(s):Pixel 5

Posted 03 August 2014 - 11:02 AM

FYI, there's now an Xposed module to patch this. You can get it on the Play Store.

Please Login or Register to see this Hidden Content

 

Please Login or Register to see this Hidden Content

  53.34KB   19 downloads

Sent from my HTC6525LVW using Tapatalk


  • mjs27541 and strasber like this

R. Long: Pixel 5

 


#8 mjs27541

mjs27541

    I have no idea what's going on...

  • News Writer
  • PipPipPipPip
  • 1,276 posts
  • LocationSouthern MD
  • Current Device(s):LG G2

Posted 08 August 2014 - 10:36 AM

Ah crap nuggets, G2 is vulnerable. Time to download the patch. Thanks again RikRong!
  • RikRong likes this

#9 RikRong

RikRong

    Cap'n Slow

  • Superuser
  • 2,117 posts
  • Twitter:@rlongjr80
  • LocationNoDak
  • Current Device(s):Pixel 5

Posted 08 August 2014 - 06:29 PM

Ah crap nuggets, G2 is vulnerable. Time to download the patch. Thanks again RikRong!

NP, I ran the Blue Box scan after I installed the module, all good now.:)

Sent from my HTC6525LVW using Tapatalk


  • mjs27541 likes this

R. Long: Pixel 5

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users