Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/13/2009
02:07 PM
50%
50%

Android Security Vulnerability Exposed

The bug lies in the media server of the browser, and it could potentially enable hackers to gain control of the audio and video function of an Android handset like the T-Mobile/HTC G1.

Security researcher Charlie Miller has exposed a security vulnerability in Google's open source Android platform that could enable hackers to take control of a user's multimedia functions.

At the SchmooCon hacker conference, Miller said the bug exists in the multimedia subsystem Android uses for its "Chrome Lite" browser, which was provided by PacketVideo's OpenCore media library. The exploit is an integer underflow that can cause improper bounds checking when writing to a heap allocated buffer, Miller said.

Miller originally said the exploit could allow malicious programmers to take control of a user's browser, and he even advised G1 users to avoid using the browser entirely until a patch was released. He later backed off those claims.

Google said it was notified of the flaw prior to the public disclosure, and Android was patched two days later in the source code repository. Google said the patch will be pushed to T-Mobile G1 users at T-Mobile's discretion, and it was not included in the recent RC33 firmware upgrade.

"Media libraries are extremely complex and can lead to bugs, so we designed our media server, which uses OpenCore, to work within its own application sandbox so that security issues in the media server would not affect other applications on the phone such as e-mail, the browser, SMS, and the dialer," said Rich Cannings, Android security engineer, in a statement. "If the bug Charlie reported to us on January 21st is exploited, it would be limited to the media server and could only exploit actions the media server performs, such as listen to and alter some audio and visual media."

This is the second Android bug involving the browser that has been exposed, which could raise some concerns about security. Google said it has designed the OS from the ground up with security in mind, and the sandbox architecture was chosen to limit the damage any exploit could cause.

How can IT departments get a handle on locking down data when it's on the move? InformationWeek has published an independent analysis of this topic. Download the report here (registration required).

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1448
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1447.
CVE-2020-1449
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Project software when the software fails to check the source markup of a file, aka 'Microsoft Project Remote Code Execution Vulnerability'.
CVE-2020-1450
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1451, CVE-2020-1456.
CVE-2020-1451
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1450, CVE-2020-1456.
CVE-2020-1454
PUBLISHED: 2020-07-14
This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Re...