Vulnerabilities / Threats
2/13/2009
02:07 PM
Connect Directly
RSS
E-Mail
50%
50%

Android Security Vulnerability Exposed

The bug lies in the media server of the browser, and it could potentially enable hackers to gain control of the audio and video function of an Android handset like the T-Mobile/HTC G1.

Security researcher Charlie Miller has exposed a security vulnerability in Google's open source Android platform that could enable hackers to take control of a user's multimedia functions.

At the SchmooCon hacker conference, Miller said the bug exists in the multimedia subsystem Android uses for its "Chrome Lite" browser, which was provided by PacketVideo's OpenCore media library. The exploit is an integer underflow that can cause improper bounds checking when writing to a heap allocated buffer, Miller said.

Miller originally said the exploit could allow malicious programmers to take control of a user's browser, and he even advised G1 users to avoid using the browser entirely until a patch was released. He later backed off those claims.

Google said it was notified of the flaw prior to the public disclosure, and Android was patched two days later in the source code repository. Google said the patch will be pushed to T-Mobile G1 users at T-Mobile's discretion, and it was not included in the recent RC33 firmware upgrade.

"Media libraries are extremely complex and can lead to bugs, so we designed our media server, which uses OpenCore, to work within its own application sandbox so that security issues in the media server would not affect other applications on the phone such as e-mail, the browser, SMS, and the dialer," said Rich Cannings, Android security engineer, in a statement. "If the bug Charlie reported to us on January 21st is exploited, it would be limited to the media server and could only exploit actions the media server performs, such as listen to and alter some audio and visual media."

This is the second Android bug involving the browser that has been exposed, which could raise some concerns about security. Google said it has designed the OS from the ground up with security in mind, and the sandbox architecture was chosen to limit the damage any exploit could cause.

How can IT departments get a handle on locking down data when it's on the move? InformationWeek has published an independent analysis of this topic. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2970
Published: 2014-07-31
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-5139. Reason: This candidate is a duplicate of CVE-2014-5139, and has also been used to refer to an unrelated topic that is currently outside the scope of CVE. This unrelated topic is a LibreSSL code change adding functionality ...

CVE-2014-0914
Published: 2014-07-30
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 7.5.0.6, Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management f...

CVE-2014-0915
Published: 2014-07-30
Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management 6.2 through 6.2.8, 6.x and 7.1 through 7.1.1.2, and 7.5 through 7.5.0.6; Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk; and Maximo Asset Management 6.2 through 6.2.8...

CVE-2014-0947
Published: 2014-07-30
Unspecified vulnerability in the server in IBM Rational Software Architect Design Manager 4.0.6 allows remote authenticated users to execute arbitrary code via a crafted update site.

CVE-2014-0948
Published: 2014-07-30
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.

Best of the Web
Dark Reading Radio