Alternative fixes released for Android 'master key' vulnerability
Many Android devices may still be vulnerable if operators haven't sent out updates
IDG News Service - More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system.
Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and vendor Duo Security, released software on Tuesday that detects if an Android device is vulnerable and applies a patch.
Google, which manages the open-source Android project, quickly issued patches for the so-called "master key" vulnerabilities, one of which was found by Bluebox Security and another one that appeared on a Chinese-language forum.
But mobile phone manufacturers and operators are often very slow in releasing patches to their users, a problem that is likely to become more critical as mobile device use rises.
The result is a large number of users running vulnerable devices. More than 156 million Android smartphones were sold in the first three months of this year worldwide, amounting to a 74 percent market share, according to analyst Gartner.
The vulnerability found by Bluebox may affect more 900 million devices made over the last four years running Android versions 1.6 and higher.
The vulnerabilities are particularly dangerous since they allow an attacker to modify an Android package file, which is used to install an application, without affecting its original cryptographic signature.
The signature is generated by the application's author and is used to verify the program's integrity. By using the vulnerability and maliciously modifying an application, a hacker could gain complete control over an Android device.
ReKey is an application that applies the Google patches. It also will alert users if an application tries to install itself using the vulnerabilities. ReKey needs root access to a device, which is normally not granted to most applications, in order to patch vulnerabilities.
Webroot wrote on Tuesday that it has deployed a patch within its SecureAnywhere Mobile product, which also covers Android's Jelly Bean 4.1 and Ice Cream Sandwich releases.
Bluebox also has an application that detects if a device is vulnerable and scans for malicious applications.
In order to protect users, Google is scanning applications in its Play store to ensure those programs are legitimate. Android also has a feature, called "Verify Apps," which allows Google to vet applications before installation.
Application markets and websites not run by Google have posed a risk for Android users. Security researchers have found numerous examples of popular applications that have been modified to deliver secret code that can spy on users.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Software Asset Management: Ensuring Today's Assets Today's trends like BYOD and SaaS are new and exciting in terms of how they will help make our jobs more productive but...
- Trends Shaping Software Management: 2014 Most IT executives recognize the relationship between mobile computing and worker productivity, and have long issued notebook computers and other mobile devices to...
- Software Asset Management: Pay Attention or Pay Up There is a wide range of options for managing software assets, from in-house solutions to the cloud to managed services providers. Read this...
- IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- Leveraging Flash Storage to Accelerate Oracle Real Application Clusters Join this webinar to understand the latest solid-state storage trends, the specific applications driving solid-state storage deployments and the benefits of deploying the... All Malware and Vulnerabilities White Papers | Webcasts