Trend Micro updates security app to detect Samsung attacks
Samsung has yet to patch flaw that can allow malicious applications to access the memory of its mobile devices
IDG News Service - Trend Micro has updated its mobile security software to detect potential attacks on several Samsung Electronics devices that have a flaw that could allow a malicious application to access all of the phone's memory.
The company's Mobile Security product now contains a "pattern" that will detect if an application attempts to exploit the flaw, which it called as serious as a "remote code execution vulnerability on Windows."
The vulnerability, described by Lookout Mobile Security as a failure to restrict kernel address space mapped to userspace via /dev/exynos-mem, is present in devices that use Samsung's 4210 and 4412 Exynos processors. Samsung has not publicly commented on the problem, and it remains unpatched.
Vulnerable devices include versions of Samsung's S2 and S3 mobile phones, as well as the Galaxy Note, Note II, Note Plus and Note 10.1.
Jonathan Leopando, a technical communications specialist with Trend Micro, said in an interview that the company has not found an example of a malicious application in the wild using the vulnerability but one will likely be found "sooner or later."
"We also believe that because of the popularity of the devices that are affected by this vulnerability that the impact could be significant," Leopando said.
After the vulnerability was described on the XDA Developers forum on Sunday, a user by the nickname "Chainfire" posted an Android application package (.apk) file that successfully exploits it.
The application has also been engineered to disable the exploit, but that function can cause other problems, such as the device's camera to stop working.
Lookout advised that "until an official device patch is released, we urge consumers with vulnerable devices to exercise caution when downloading and installing applications."
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts