Vulnerabilities / Threats
9/20/2013
01:36 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Android Facebook App Users: Patch Now

Facebook has fixed a bug in its Android app that left photos vulnerable to interception.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Facebook apps for Android users: Ensure you've recently updated your Facebook app.

That warning comes via Egyptian security researcher Mohamed Ramadan, who disclosed Thursday that he'd found an HTTPS bug in Facebook's Android app -- as well as Facebook Messenger -- that have now been patched by the social network's security team. The bug could be exploited by an attacker using Wireshark or another sniffing tool to intercept images being transmitted to Facebook.

According to Ramadan's security report to Facebook, filed in February 2013, "I found that the official Facebook Messenger and Facebook app for Android latest version are sending and receiving images using HTTP protocol and anyone on the same wireless network can sniff my traffic and view all images or even replace it with his own images."

As a result, when using a vulnerable version of one of the apps, "if you are using a wireless network at cafe, hotel, airport, museum, disco, your friend's wireless network or even your own wireless network ... an attacker can run cain and abel, Ettercap, SSLstrip or his own tool to poison the traffic and hijack ARP table and sniff your images and your private images and leak it online or send it to his friends," he said.

[ You may have more pressing concerns. See Apple Hacker: Mobile Malware Threat Overrated. ]

Facebook's use of HTTP for sending people's images appeared to be an inadvertent programming error. For comparison's sake, Ramadan noted, Facebook apps for iOS were sending images using HTTPS, which would have prevented anyone from intercepting them using sniffing tools.

Accordingly, he recommended that all affected Android users update immediately, to protect their privacy. "Don't be lazy," said Ramadan, who runs Attack-Secure, which offers "smarter ethical hacking and penetration testing," including a "ninja skills course."

Ramadan's bug disclosure earned him $1,500 as part of Facebook's bug bounty program. Facebook later sweetened the payout by $500 for Ramadan alerting it to HTTPS problems in Facebook Messenger for Android. "Both were rooted in the same code issues so we essentially treated the Messenger issues as part of the same report rewarded with the bounty," Facebook's security team told him.

That didn't mark Ramadan's first appearance on Facebook's White Hat Security wall of thanks. Last year, for example, he earned $3,000 for informing Facebook of a critical vulnerability in its Facebook Camera app for iPhone. He's also spotted vulnerabilities in BlackBerry apps, as well as on the websites of Adobe, GitHub, Google, Microsoft and others.

Attention on how websites transmit people's personal information or potentially sensitive material -- such as photographs -- has been high since security researcher Eric Butler published his Firesheep tool in 2010. The Firefox plug-in allowed anyone to intercept the login information and other sensitive communications to sites such as Amazon, Facebook, Google and Twitter, for anyone connected to the same unsecured wireless network. While such data interception had long been possible using sniffing tools, Butler's plug-in drove most Web services to begin using HTTPS, at least for securing sensitive information such as login credentials.

Learn more about mobile security and other threats by attending the Interop conference track on Risk Management and Security in New York from Sept. 30 to Oct. 4.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web