{"id":1009,"date":"2010-11-16T08:19:10","date_gmt":"2010-11-15T18:19:10","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/2010\/11\/16\/researcher-releases-android-exploit-in-webkit-browser-engine\/"},"modified":"2010-11-15T14:38:07","modified_gmt":"2010-11-15T07:38:07","slug":"researcher-releases-android-exploit-in-webkit-browser-engine","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2010\/11\/researcher-releases-android-exploit-in-webkit-browser-engine\/","title":{"rendered":"Researcher Releases Android Exploit In Webkit Browser Engine"},"content":{"rendered":"<p>And Android security hits the news once again, it\u2019s not a vulnerability in the OS per-say but rather in the browser based on the Webkit engine. It does highlight the inherent fragmentation problems with the Android platform and the security concerns that come with running old OS and software versions.<\/p>\n<p><!--more--><\/p>\n<p>It\u2019s a problem that is plaguing Android right now with different phones running different core OS versions (from 1.5 to 2.2) \u2013 on top of that 3rd party skins for the OS from Samsung, Motorola and more. This makes updating the OS slow and many users are stuck with old versions and no news regarding updates.<\/p>\n<blockquote><p>\nA security researcher has released proof-of-concept code that exploits a vulnerability in most versions of Google\u2019s Android operating system for smartphones.<br \/>\nM.J. Keith of Alert Logic said he released the attack code to expose what he characterized as inadequate patching practices for the open-source mobile platform. Rather than find the underlying bug himself, he searched through a list of documented security flaws for Apple\u2019s Safari, which relies on the same Webkit browser engine used in Android. In short order, he had an attack that exploits about two-thirds of the handsets that rely on the OS.<br \/>\n\u201cThey need a better patching system,\u201d Keith told The Register. \u201cThey do a good job of repairing future releases, but I think a better patching system needs to be set up for Android.\u201d<br \/>\nThe bug Keith\u2019s code exploits was fixed in Android 2.2, but according to figures supplied by Google, only 36 percent of users have the most recent version. That means the remainder are susceptible to the attack.<\/p><\/blockquote>\n<p>Google has claimed that they are changing the architecture with the upcoming release of Gingerbread, many of the system apps will be pushed to the Marketplace \u2013 meaning they can push out updates much faster and easier than if everything is integrated in the OS image.<\/p>\n<p>Of course core problems with the kernel or underlying OS will still have to be addressed via firmware updates, but still like this \u2013 which effects the browser \u2013 could be negated if a new browser version could be pushed out from the Android Marketplace.<\/p>\n<p>The same goes for the recent Critical Zero Day Abobe Flash Flaw Which Put Android Phones At Risk.<\/p>\n<blockquote><p>What\u2019s more, Keith said he had no trouble finding other documented Webkit vulnerabilities that have yet to be fixed in version 2.2.<\/p>\n<p>\u201cI found about four or five and I wasn\u2019t trying to [do] an exhaustive search,\u201d he said.<\/p>\n<p>A Google spokesman declined to comment for this post. To be fair, Android\u2019s design does a good job of segregating the functions of one application from those of another. That would make it hard for someone exploiting the bug Keith demonstrated to gain root privileges or access to many of the targeted handset\u2019s resources. But it still would allow an attacker to access anything the browser can read, including a phone\u2019s Secure Digital memory card.<\/p>\n<p>The bigger point, Keith said, is that most users have no idea their devices are vulnerable to bugs that were patched long ago on other platforms.<\/p>\n<p>\u201cI wanted to demonstrate that nobody\u2019s being notified that their Android phone is vulnerable to this stuff,\u201d he explained. Google \u201cwants to pretend it\u2019s not there.\u201d<\/p><\/blockquote>\n<p>It is a serious problem that Android is facing right now and I hope Google do more to address this and work alongside with the handset vendors so OS updates can be pushed out in a more efficient and timely manner.<\/p>\n<p>The exploit code can be found here:<\/p>\n<p><a rel=\"nofollow\" href=\"http:\/\/www.exploit-db.com\/exploits\/15423\/\" target=\"_blank\">Android 2.0-2.1 Reverse Shell Exploit<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>And Android security hits the news once again, it\u2019s not a vulnerability in the OS per-say but rather in the browser based on the Webkit engine. It does highlight the&#8230;<\/p>\n","protected":false},"author":439,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[108],"tags":[103,193,194,2874,192],"class_list":["post-1009","post","type-post","status-publish","format-standard","hentry","category-android-2","tag-android","tag-browser","tag-engine","tag-exploit","tag-webkit"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-gh","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/1009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/439"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=1009"}],"version-history":[{"count":1,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/1009\/revisions"}],"predecessor-version":[{"id":1010,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/1009\/revisions\/1010"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=1009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=1009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=1009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}