Monday, 4 August 2014

Every Android application has its own unique identity, typically inherited from the corporate developer’s identity. The Bluebox Security research team, Bluebox Labs, recently discovered a new vulnerability in Android, which allows these identities to be copied and used for bad purposes . 
           
                              

The “Fake ID,”  vulnerability allows malicious applications to impersonate specially recognized trusted applications without any user notification. This can result in a wide spectrum of consequences. For example, the vulnerability can be used by malware to escape the normal application sandbox and take one or more malicious actions: insert a Trojan horse into an application by impersonating Adobe Systems; gain access to NFC financial and payment data by impersonating Google Wallet; or take full management control of the entire device by impersonating 3LM.


                                 Implications

This is a widespread vulnerability dating back to the January 2010 release of Android 2.1 and affecting all devices that are not patched for Google bug 13678484, disclosed to Google and released for patching in April 2014. All devices prior to Android 4.4 (“KitKat”) are vulnerable to the Adobe System webview plugin privilege escalation, which allows a malicious application to inject Trojan horse code (in the form of a webview plugin) into other apps, which leads to taking control of the entire app, all of the apps’s data, and being able to do anything the app is allowed to do. Android 4.4 is vulnerable to Fake ID, but not specifically to the Adobe System webview plugin due to a change in the webview component (the switch from webkit to Chromium moved away from the vulnerable Adobe-centric plugin code). 

Users of devices from specific vendors that include device administration extensions are at risk for a partial or full device compromise by malware. The 3LM device extensions (temporarily owned by Motorola and Google) are present in various HTC, Pantech, Sharp, Sony Ericsson, and Motorola devices – and are susceptible to the vulnerability as well.
Other devices and applications that depend upon the presence of specific signatures to authenticate an application may also be vulnerable. Essentially anything that relies on verified signature chains of an Android application is undermined by this vulnerability.



                          Status of Vulnerability Fix  


Effectively addressing a vulnerability requires a three step process:
1)  Google produces a generic code fix, which it provides to the Android phone manufacturers
2)  Then phone manufacturers must then incorporate that fix into a firmware update suitable to specific phones, which they provide to carriers
3)  The carrier then distributes the final update, which ensures your phone is safe from the vulnerability
As regards Fake ID, Google has provided the generic code fix to the phone manufacturers.  Currently the manufacturers and carriers are working to get that fix out to you.  The Bluebox Security Scanner will help you track when that finally happens.  Alternatively, you can contact customer support for your phone manufacturer or carrier for the more current and up-to-date status for your specific Android phone.

      Install the Bluebox Security Scanner to see if you've been exposed to this vulnerability.     
                    
Save Your Page From Getting Hacked


Source of this Post is khalil-shreateh.com

0 comments:

Post a Comment