New security flaw discovered in the Android operating system
January 30, 2011
A computer scientist has discovered a new security flaw in the latest version of Google's Android mobile operating system that can be exploited to reveal sensitive user information.
The data-stealing vulnerability in Android version 2.3 (dubbed Gingerbread) allows potential attackers to view and upload photos, voicemail and other data stored on a mobile handset's SD memory card said Xuxian Jiang, assistant professor in North Carolina State University's department of computer science.
The security hole, which is exploited when a user clicks on a booby-trapped link, also allows attackers to upload phone apps to a remote server and without the user knowing anything about it.
He said proof-of-concept code successfully carries out the attack on a standard Nexus S phone, which comes with Gingerbread already installed. It's not clear if the attack works on other brands that also run the latest operating system, however.
“We've already incorporated a patch for a security issue in the Android browser on a limited number of devices that could, under certain circumstances, allow for accessing application and other types of data stored on the phone,” a Google spokesman wrote in an email. “We're in constant communication with all our partners.”
The security patch will ship in an upcoming 2.3 maintenance release, Google said.
The information-disclosure threat is similar to one disclosed in November in Android 2.2 by researcher Thomas Cannon. Both security vulnerabilities disclose data only when an attacker knows the precise name and path of a file stored on an SD card.
But the exploit can't break out of the security sandbox, so system data and email, SMS messages and files stored on the phone itself remain off limits, at least for now.
The new but very serious security vulnerability discovered in November could allow hackers and Internet attackers to access private data from SD cards in Google smartphones and MIDs (mobile Internet devices).
Additionally, it would also be possible to retrieve a limited range of other private information and specific files stored on the Android phone using this vulnerability.
Redirects can then be used to post the data back to a malicious website.
Cannon has gone public ahead of a update to the Android OS he says will be necessary to fix the problem in order to warn other users of the security risk. He was very keen to stress he has no anti-Android axe to grind, going so far as to praise Google for its handling of the issue this far.
"Google's response so far has been excellent. I would not release an advisory while there is a chance that users will be able to receive a patch in a reasonable time frame. However, in this case, I don't believe they will be able to," said Cannon.
"This isn't because of Google's response process, but because of the way mobile handsets have to receive OS updates from device makers. I therefore believe it's better that users are given a chance to protect themselves at an early opportunity, or at least understand the immediate security risks," Cannon added.
Another means of reducing the vulnerability would be to use a potentially vulnerable mobile handset without an SD card, Cannon hinted.
In a statement, a Google spokesman acknowledged the security issue and said it was in the process of developing and releasing a security patch soon.
"Recently, we've developed a patch for another security issue in the Android browser that could, under certain circumstances, allow for accessing files on a user's SD card. We're working to issue the fix to our partners and open source Android," said the Google spokesman.
Google's security team told Cannon that they are aiming for a fix to go into Gingerbread maintenance release. "They don't have a time frame for OEMs to release the update though, which is an issue, as that is the weak link," added Cannon.
You can link to the Internet Security web site as much as you like.