Android Security Vulnerability Exposed
The bug lies in the media server of the browser, and it could potentially enable hackers to gain control of the audio and video function of an Android handset like the T-Mobile/HTC G1.
Security researcher Charlie Miller has exposed a security vulnerability in Google's open source Android platform that could enable hackers to take control of a user's multimedia functions.
At the SchmooCon hacker conference, Miller said the bug exists in the multimedia subsystem Android uses for its "Chrome Lite" browser, which was provided by PacketVideo's OpenCore media library. The exploit is an integer underflow that can cause improper bounds checking when writing to a heap allocated buffer, Miller said.
More Security Insights
- How Attackers Identify and Exploit Software and Network Vulnerabilities
- Cloud Security: It’s Not Just for IT Anymore
- The Business Value of Hybrid Cloud -Based Compromise Intelligence Monitoring and Threat Mitigation
- Learn How Neustar Technology Can Block DDoS Attacks
Miller originally said the exploit could allow malicious programmers to take control of a user's browser, and he even advised G1 users to avoid using the browser entirely until a patch was released. He later backed off those claims.
Google said it was notified of the flaw prior to the public disclosure, and Android was patched two days later in the source code repository. Google said the patch will be pushed to T-Mobile G1 users at T-Mobile's discretion, and it was not included in the recent RC33 firmware upgrade.
"Media libraries are extremely complex and can lead to bugs, so we designed our media server, which uses OpenCore, to work within its own application sandbox so that security issues in the media server would not affect other applications on the phone such as e-mail, the browser, SMS, and the dialer," said Rich Cannings, Android security engineer, in a statement. "If the bug Charlie reported to us on January 21st is exploited, it would be limited to the media server and could only exploit actions the media server performs, such as listen to and alter some audio and visual media."
This is the second Android bug involving the browser that has been exposed, which could raise some concerns about security. Google said it has designed the OS from the ground up with security in mind, and the sandbox architecture was chosen to limit the damage any exploit could cause.
How can IT departments get a handle on locking down data when it's on the move? InformationWeek has published an independent analysis of this topic. Download the report here (registration required).