Trend Micro updates security app to detect Samsung attacks
Samsung has yet to patch flaw that can allow malicious applications to access the memory of its mobile devices
IDG News Service - Trend Micro has updated its mobile security software to detect potential attacks on several Samsung Electronics devices that have a flaw that could allow a malicious application to access all of the phone's memory.
The company's Mobile Security product now contains a "pattern" that will detect if an application attempts to exploit the flaw, which it called as serious as a "remote code execution vulnerability on Windows."
The vulnerability, described by Lookout Mobile Security as a failure to restrict kernel address space mapped to userspace via /dev/exynos-mem, is present in devices that use Samsung's 4210 and 4412 Exynos processors. Samsung has not publicly commented on the problem, and it remains unpatched.
Vulnerable devices include versions of Samsung's S2 and S3 mobile phones, as well as the Galaxy Note, Note II, Note Plus and Note 10.1.
Jonathan Leopando, a technical communications specialist with Trend Micro, said in an interview that the company has not found an example of a malicious application in the wild using the vulnerability but one will likely be found "sooner or later."
"We also believe that because of the popularity of the devices that are affected by this vulnerability that the impact could be significant," Leopando said.
After the vulnerability was described on the XDA Developers forum on Sunday, a user by the nickname "Chainfire" posted an Android application package (.apk) file that successfully exploits it.
The application has also been engineered to disable the exploit, but that function can cause other problems, such as the device's camera to stop working.
Lookout advised that "until an official device patch is released, we urge consumers with vulnerable devices to exercise caution when downloading and installing applications."
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts