Alternative fixes released for Android 'master key' vulnerability
Many Android devices may still be vulnerable if operators haven't sent out updates
IDG News Service - More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system.
Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and vendor Duo Security, released software on Tuesday that detects if an Android device is vulnerable and applies a patch.
Google, which manages the open-source Android project, quickly issued patches for the so-called "master key" vulnerabilities, one of which was found by Bluebox Security and another one that appeared on a Chinese-language forum.
But mobile phone manufacturers and operators are often very slow in releasing patches to their users, a problem that is likely to become more critical as mobile device use rises.
The result is a large number of users running vulnerable devices. More than 156 million Android smartphones were sold in the first three months of this year worldwide, amounting to a 74 percent market share, according to analyst Gartner.
The vulnerability found by Bluebox may affect more 900 million devices made over the last four years running Android versions 1.6 and higher.
The vulnerabilities are particularly dangerous since they allow an attacker to modify an Android package file, which is used to install an application, without affecting its original cryptographic signature.
The signature is generated by the application's author and is used to verify the program's integrity. By using the vulnerability and maliciously modifying an application, a hacker could gain complete control over an Android device.
ReKey is an application that applies the Google patches. It also will alert users if an application tries to install itself using the vulnerabilities. ReKey needs root access to a device, which is normally not granted to most applications, in order to patch vulnerabilities.
Webroot wrote on Tuesday that it has deployed a patch within its SecureAnywhere Mobile product, which also covers Android's Jelly Bean 4.1 and Ice Cream Sandwich releases.
Bluebox also has an application that detects if a device is vulnerable and scans for malicious applications.
In order to protect users, Google is scanning applications in its Play store to ensure those programs are legitimate. Android also has a feature, called "Verify Apps," which allows Google to vet applications before installation.
Application markets and websites not run by Google have posed a risk for Android users. Security researchers have found numerous examples of popular applications that have been modified to deliver secret code that can spy on users.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Malware and Vulnerabilities White Papers | Webcasts