Risk
7/17/2013
02:20 PM
Connect Directly
RSS
E-Mail
50%
50%

Google Play Has Apps Abusing Master Key Vulnerability

Two apps currently available for download in Google Play abuse the critical master key vulnerability that affects almost all Android devices. Is Google reviewing apps for the flaw?

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Google Play alert: An information security researcher has spotted two apps that use the master key vulnerability that's present in an estimated 99% of all Android devices. But rather than being distributed by sketchy third-party app stores, which are known for harboring malicious apps that have been disguised as free versions of the real thing, these two apps are available directly from the official Google Play app store.

Fortunately, the apps don't appear to be malicious. But the presence of the free apps -- Rose Wedding Cake Game and Pirates Island Mahjong Free, which have been downloaded by between 15,000 and 60,000 people -- on the Google Play site calls into question whether Google is now scanning for apps that abuse the so-called master key vulnerability that was discovered by Bluebox Labs in February and detailed by Android hackers earlier this month, as well as a similar vulnerability that was disclosed last week by researchers at Android Security Squad in China.

"We always advise people to stick to applications that are delivered via Google Play," said Bogdan Botezatu, the senior e-threat analyst at BitDefender who discovered the apps, speaking by phone. "But we just saw applications manifesting this behavior on Google Play. So what do I advise my users and readers?"

In the meantime, he's notified Google about the apps and emphasized that "they do not pose a threat for users." In addition, he said, "We also notified the developers because at the moment we do not know if this is a voluntary behavior or if this is a side effect of them using a specific software development toolkit," which in this case was Adobe AIR. It's also possible that a simple coding mistake is to blame for the apps sporting two duplicate PNG files with the same name and extension being located in the same folder. "This is not a good practice, because the file system was not designed in such a way to allow two files with the same names and the same extension to be in the same folder -- it's going to lead to confusion," said Botezatu.

[ ReKey app patches major Android vulnerability, but devices must be rooted. Read more at Android Users Can Patch Critical Flaw. ]

Regardless, the apps won't be allowed to execute by the latest version of Android, or if users have installed antivirus or security software designed to block the master key exploit.

But given that Google was first alerted to the vulnerability in February, it's curious that its automated Bouncer application security checks didn't intercept the apps, which were last updated in mid-May and mid-June. "I'm not sure if Google Play didn't flag these applications as malicious because they didn't have malicious behavior, or if they weren't able to scan these applications for the vulnerability in Google Play," Botezatu said.

A Google spokesman didn't immediately respond to an emailed request for comment about the apps, or whether Google is now actively scanning all apps to detect if they appear to exploit the vulnerability.

From a patch standpoint, Android quickly patched the master key vulnerability in the Android Open Source Project (AOSP) after learning of the vulnerability in February, and some recently released devices -- Samsung Galaxy S4 and HTC One devices running Android 4.2.2 or above -- have a related patch. Likewise, the developers behind the third-party Android firmware CyanogenMod have updated their firmware with patches for the master key vulnerability identified by Bluebox Labs, as well as the more recent vulnerability identified by Android Security Squad.

How can other Android users protect themselves against the vulnerability? The easiest approach is to use an Android antivirus app that's been updated to block any apps that attempt to exploit the vulnerability, and both BitDefender and Webroot updated their Android antivirus software Tuesday, with Botezatu noting that BitDefender's software also includes a patch for the flaw spotted by Android Security Squad. Alternately, more advanced Android users can install ReKey from Duo Security, which will patch the vulnerability, but only on rooted devices.

Unfortunately, however, the majority of Android may have to wait months -- if ever -- to see a related operating system update for their device from their handset maker or carrier. "The thing is, not for users of Cyanogenmod, but rather who are part of the huge ecosystem that's Android 2.3.3 Gingerbread [or earlier], they are highly unlikely to receive any security updates from carriers," said BitDefender's Botezatu. "That's why we rushed the fix for our antivirus, because everyone can install an antivirus, but not everyone can upgrade their device. It's difficult for a regular user to root their phone and install a third-party ROM."

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
speedo1456
50%
50%
speedo1456,
User Rank: Apprentice
7/13/2014 | 8:07:05 PM
Google taking steps to improve things?
Thumbs up for Google. Finally a big company is looking in some issues that concerns many android phone users. It took a while but maybe this is the beginning of some cleanup that had to be done inside the android market.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5316
Published: 2014-09-21
Cross-site scripting (XSS) vulnerability in Dotclear before 2.6.4 allows remote attackers to inject arbitrary web script or HTML via a crafted page.

CVE-2014-5320
Published: 2014-09-21
The Bump application for Android does not properly handle implicit intents, which allows attackers to obtain sensitive owner-name information via a crafted application.

CVE-2014-5321
Published: 2014-09-21
FileMaker Pro before 13 and Pro Advanced before 13 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2319...

CVE-2014-5322
Published: 2014-09-21
Cross-site scripting (XSS) vulnerability in the Instant Web Publish function in FileMaker Pro before 13 and Pro Advanced before 13 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-3640.

CVE-2014-6602
Published: 2014-09-21
Microsoft Asha OS on the Microsoft Mobile Nokia Asha 501 phone 14.0.4 allows physically proximate attackers to bypass the lock-screen protection mechanism, and read or modify contact information or dial arbitrary telephone numbers, by tapping the SOS Option and then tapping the Green Call Option.

Best of the Web
Dark Reading Radio