|
|
Log in / Subscribe / Register

Security

Android application security

By Jake Edge
February 4, 2009

Recent reports of a misbehaving Android application have rekindled concerns about the security of Android-based mobile phones. Because applications can be made available in the Android Market by anyone, without any review, it would seem to be an excellent target for malware purveyors. The Android security model is meant to sandbox applications, but some applications need more capabilities—to get them, they ask the user. While it appears that the application in question, MemoryUp, was actually innocent of what is was accused of doing, the incident highlights potential problems with Android security.

Unlike the iPhone App Store, Android applications are not vetted before being placed into the Android Market. In addition, for now, Android applications must be distributed for free, though that is set to change sometime later this year. Given the problems with Apple's inconsistent and anti-competitive decisions on iPhone applications, Google's openness has some benefits. But it also has some pitfalls.

Applications are required to be signed with a developer's private key, which should provide some measure of accountability. Given that it only takes a Google account and $25 to get into the developers program, it may not be very difficult for a malicious developer to get an "anonymous" (or largely untraceable) key. But there is a larger issue as well. The security model leaves it up to users to, essentially, guess whether they should allow an application to have additional privileges.

As David "Lefty" Schlesinger points out in his blog, the security model in many ways faults the user: "I've commented in a variety of places about the problems with Android's security model, and how it essentially made any security problem the users' fault by asking them to approve what the application says it wants to do--in broad terms--on installation, without any policy component behind it at all." While it appears that MemoryUp neither asked for, nor received, any extra privileges, it is something that actual malware—or, worse in some ways, applications that live in the gray area between malware and benign-ware—developers will not hesitate to exploit.

If an application needs network access to do its job, it will presumably be granted that access by the user at install time. But, there is nothing stopping that application from using that access in ways the user might never approve. Combining network access with access to personal data, leaves the user wide open to sharing that data in ways they might not expect—or approve of. In some ways, that is no different than Android's automatic syncing of contact information to Gmail, which ensures that Google has access to that info. Undoubtedly Google's privacy policy prohibits them doing anything overt with that information, but it is, or should be, worrisome.

Mobile phones are rather sophisticated computing devices these days, with multiple connectivity choices, and lots more storage than even desktop machines had just a few years ago. Along with that sophistication goes the security risk. We have yet to train users to make sensible security decisions on their desktop machines—though it seems like it might be getting slowly better—do we truly expect them to make good decisions when "HotPhoneApp" asks for more access than it truly deserves?

For Linux desktops and servers, distributors generally play the role of application examiners. In many ways, they are the first line of defense against malware. It is understandable why Google might not want to play that role, but users should keep it in mind when installing Android applications.

Comments (16 posted)

Brief items

Linux also affected by hole in Ralink's Wi-fi driver (heise online)

Ralink Wi-fi drivers have a flaw that may lead to arbitrary code execution on Linux boxes, as reported by heise online. "The flaw discovered in Ralink's Wi-fi drivers for Windows last weekend also affects the Linux drivers – as already suspected. Attackers can exploit the hole to crash a computer remotely or possibly even inject and execute arbitrary code. Debian has released new packages for the rt2400, rt2500 and rt2570 models, but the packages need to be compiled by the user for the time being." Other distributions are undoubtedly vulnerable as well.

Comments (18 posted)

Drive-By 'War Cloning' Attack Hacks Electronic Passports, Driver's Licenses (DarkReading)

DarkReading takes a look at RFID snooping and cloning of identification cards from a distance. The article is based on research by Chris Paget that will be presented at SchmooCon, which starts on February 6. "Unlike previous RFID hacks that have been conducted within inches of the targeted ID, Paget's hack can scan RFID tags from 20 feet away. 'This is a vicinity versus proximity read,' he says. 'The passport card is a real radio broadcast, so there's no real limit to the read range. It's conceivable that these things can be tracked from 100 meters -- a couple of miles.'"

Comments (15 posted)

New vulnerabilities

audiofile: arbitrary code execution

Package(s):audiofile CVE #(s):CVE-2008-5824
Created:February 2, 2009 Updated:March 16, 2010
Description:

From the SUSE advisory:

A heap-overflow in libaudiofile was fixed. The overflow existsed in the WAV processing code and can be exploited to execute arbitrary code. (CVE-2008-5824)

Alerts:
Ubuntu USN-912-1 audiofile 2010-03-16
Debian DSA-1972-2 audiofile 2010-01-21
Debian DSA-1972-1 audiofile 2010-01-17
SuSE SUSE-SR:2009:003 boinc-client, xrdp, phpMyAdmin, libnasl, moodle, net-snmp, audiofile, xterm, amarok, libpng, sudo, avahi 2009-02-02

Comments (none posted)

boinc-client: incorrect use of OpenSSL API

Package(s):boinc-client CVE #(s):CVE-2009-0126
Created:February 2, 2009 Updated:February 9, 2009
Description:

From the SUSE advisory:

The boinc-client was missing return value checks for openssl function calls. (CVE-2009-0126)

Alerts:
Fedora FEDORA-2009-0587 boinc-client 2009-01-16
Fedora FEDORA-2009-0578 boinc-client 2009-01-16
Debian DSA-1718-1 boinc 2009-02-08
SuSE SUSE-SR:2009:003 boinc-client, xrdp, phpMyAdmin, libnasl, moodle, net-snmp, audiofile, xterm, amarok, libpng, sudo, avahi 2009-02-02

Comments (none posted)

firefox: multiple vulnerabilities

Package(s):firefox CVE #(s):CVE-2009-0352 CVE-2009-0353 CVE-2009-0354 CVE-2009-0355 CVE-2009-0356 CVE-2009-0357 CVE-2009-0358
Created:February 4, 2009 Updated:July 13, 2009
Description: Several vulnerabilities have been fixed by the Firefox 3.0.6 release; see the release notes for details.
Alerts:
Gentoo 201301-01 firefox 2013-01-07
Debian DSA-1830-1 icedove 2009-07-12
CentOS CESA-2009:0258 thunderbird 2009-05-19
SuSE SUSE-SA:2009:023 MozillaFirefox 2009-04-20
Mandriva MDVSA-2009:083 mozilla-thunderbird 2009-04-01
Fedora FEDORA-2009-3161 seamonkey 2009-03-30
Fedora FEDORA-2009-3101 seamonkey 2009-03-30
Red Hat RHSA-2009:0258-01 thunderbird 2009-03-24
Fedora FEDORA-2009-2882 thunderbird 2009-03-21
Fedora FEDORA-2009-2884 thunderbird 2009-03-21
Ubuntu USN-741-1 mozilla-thunderbird, thunderbird 2009-03-19
Mandriva MDVSA-2009:044 firefox 2008-02-20
SuSE SUSE-SA:2009:009 MozillaFirefox 2009-02-16
Ubuntu USN-717-2 firefox-3.0 2009-02-10
Ubuntu USN-717-1 firefox-3.0, xulrunner-1.9 2009-02-10
Fedora FEDORA-2009-1399 totem 2009-02-06
Fedora FEDORA-2009-1399 chmsee 2009-02-06
Fedora FEDORA-2009-1399 cairo-dock 2009-02-06
Fedora FEDORA-2009-1399 gtkmozembedmm 2009-02-06
Fedora FEDORA-2009-1399 kazehakase 2009-02-06
Fedora FEDORA-2009-1398 kazehakase 2009-02-06
Fedora FEDORA-2009-1399 gnome-web-photo 2009-02-06
Fedora FEDORA-2009-1398 gnome-web-photo 2009-02-06
Fedora FEDORA-2009-1399 evolution-rss 2009-02-06
Fedora FEDORA-2009-1398 evolution-rss 2009-02-06
Fedora FEDORA-2009-1398 gecko-sharp2 2009-02-06
Fedora FEDORA-2009-1399 mugshot 2009-02-06
Fedora FEDORA-2009-1398 Miro 2009-02-06
Fedora FEDORA-2009-1399 yelp 2009-02-06
Fedora FEDORA-2009-1398 yelp 2009-02-06
Fedora FEDORA-2009-1399 devhelp 2009-02-06
Fedora FEDORA-2009-1398 devhelp 2009-02-06
Fedora FEDORA-2009-1399 mozvoikko 2009-02-06
Fedora FEDORA-2009-1398 mozvoikko 2009-02-06
Fedora FEDORA-2009-1399 epiphany-extensions 2009-02-06
Fedora FEDORA-2009-1398 epiphany-extensions 2009-02-06
Fedora FEDORA-2009-1398 epiphany 2009-02-06
Fedora FEDORA-2009-1398 xulrunner 2009-02-06
Fedora FEDORA-2009-1399 galeon 2009-02-06
Fedora FEDORA-2009-1398 galeon 2009-02-06
Fedora FEDORA-2009-1399 blam 2009-02-06
Fedora FEDORA-2009-1398 blam 2009-02-06
Fedora FEDORA-2009-1399 firefox 2009-02-06
CentOS CESA-2009:0256 firefox 2009-02-05
Fedora FEDORA-2009-1399 ruby-gnome2 2009-02-06
Fedora FEDORA-2009-1398 ruby-gnome2 2009-02-06
Fedora FEDORA-2009-1399 google-gadgets 2009-02-06
Fedora FEDORA-2009-1398 google-gadgets 2009-02-06
Fedora FEDORA-2009-1399 gnome-python2-extras 2009-02-06
Fedora FEDORA-2009-1398 gnome-python2-extras 2009-02-06
Fedora FEDORA-2009-1398 mugshot 2009-02-06
Fedora FEDORA-2009-1399 Miro 2009-02-06
Fedora FEDORA-2009-1398 pcmanx-gtk2 2009-02-06
Fedora FEDORA-2009-1399 epiphany 2009-02-06
Fedora FEDORA-2009-1399 xulrunner 2009-02-06
Slackware SSA:2009-036-01 firefox 2009-02-06
Fedora FEDORA-2009-1398 firefox 2009-02-06
CentOS CESA-2009:0257 seamonkey 2009-02-04
Red Hat RHSA-2009:0257-01 seamonkey 2009-02-04
Red Hat RHSA-2009:0256-01 firefox 2009-02-04

Comments (none posted)

glpi: SQL injection

Package(s):glpi CVE #(s):
Created:February 4, 2009 Updated:February 4, 2009
Description: GLPI prior to version 0.71.4 suffers from an unspecified SQL injection vulnerability.
Alerts:
Fedora FEDORA-2009-1092 glpi 2009-01-29

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2008-5713
Created:January 29, 2009 Updated:May 7, 2009
Description:

From the Ubuntu advisory:

It was discovered that in certain situations the network scheduler did not correctly handle very large levels of traffic. A local attacker could produce a high volume of UDP traffic resulting in a system hang, leading to a denial of service. Ubuntu 8.04 was not affected. (CVE-2008-5713)

Alerts:
Debian DSA-1794-1 linux-2.6 2009-05-06
Red Hat RHSA-2009:0264-01 kernel 2009-02-10
Ubuntu USN-714-1 linux-source-2.6.15/22, linux 2009-01-29

Comments (none posted)

libpng: memory overwrite

Package(s):libpng CVE #(s):CVE-2008-5907
Created:February 2, 2009 Updated:March 23, 2009
Description:

From the SUSE advisory:

This update of libpng fixes the function png_check_keyword() that allowed setting arbitrary bytes in the process memory to 0. (CVE-2008-5907)

Alerts:
Gentoo 201412-08 insight, perl-tk, sourcenav, tk, partimage, bitdefender-console, mlmmj, acl, xinit, gzip, ncompress, liblzw, splashutils, m4, kdm, gtk+, kget, dvipng, beanstalkd, pmount, pam_krb5, gv, lftp, uzbl, slim, iputils, dvbstreamer 2014-12-11
Debian DSA-1750-1 libpng 2009-03-22
Gentoo 200903-28 libpng 2009-03-15
Ubuntu USN-730-1 libpng 2009-03-06
Mandriva MDVSA-2009:051 libpng 2008-02-23
SuSE SUSE-SR:2009:003 boinc-client, xrdp, phpMyAdmin, libnasl, moodle, net-snmp, audiofile, xterm, amarok, libpng, sudo, avahi 2009-02-02

Comments (none posted)

linux: denial of service

Package(s):linux CVE #(s):CVE-2008-5395
Created:January 30, 2009 Updated:May 7, 2009
Description: The kernel has a denial of service vulnerability. From the national vulnerability database entry: The parisc_show_stack function in arch/parisc/kernel/traps.c in the Linux kernel before 2.6.28-rc7 on PA-RISC allows local users to cause a denial of service (system crash) via vectors associated with an attempt to unwind a stack that contains userspace addresses.
Alerts:
Debian DSA-1794-1 linux-2.6 2009-05-06
Debian DSA-1787-1 linux-2.6.24 2009-05-02
Ubuntu USN-715-1 linux 2009-01-29

Comments (none posted)

moin: cross-site scripting

Package(s):moin CVE #(s):CVE-2009-0260 CVE-2009-0312
Created:January 29, 2009 Updated:June 18, 2009
Description:

From the Debian advisory:

It was discovered that the AttachFile action in moin, a python clone of WikiWiki, is prone to cross-site scripting attacks (CVE-2009-0260). Another cross-site scripting vulnerability was discovered in the antispam feature (CVE-2009-0312).

Alerts:
Fedora FEDORA-2009-6576 moin 2009-06-18
Fedora FEDORA-2009-6557 moin 2009-06-18
Fedora FEDORA-2009-6559 moin 2009-06-18
Fedora FEDORA-2009-3868 moin 2009-04-21
Fedora FEDORA-2009-3845 moin 2009-04-21
Ubuntu USN-716-1 moin 2009-01-30
Debian DSA-1715 moin 2009-01-29

Comments (none posted)

phpMyAdmin: cross-site request forgery

Package(s):phpMyAdmin CVE #(s):CVE-2008-5621 CVE-2008-5622
Created:February 2, 2009 Updated:March 25, 2009
Description:

From the CVE entries:

CVE-2008-5621: Cross-site request forgery (CSRF) vulnerability in phpMyAdmin 2.11.x before 2.11.9.4 and 3.x before 3.1.1.0 allows remote attackers to perform unauthorized actions as the administrator via a link or IMG tag to tbl_structure.php with a modified table parameter. NOTE: this can be leveraged to conduct SQL injection attacks and execute arbitrary code.

CVE-2008-5622: Multiple cross-site request forgery (CSRF) vulnerabilities in phpMyAdmin 2.11.x before 2.11.9.4 and 3.x before 3.1.1.0 allow remote attackers to conduct SQL injection attacks via unknown vectors related to the table parameter, a different vector than CVE-2008-5621.

Alerts:
Fedora FEDORA-2009-3006 phpMyAdmin 2009-03-25
Fedora FEDORA-2009-2984 phpMyAdmin 2009-03-25
Gentoo 200903-32 phpmyadmin 2009-03-18
Mandriva MDVSA-2009:026-1 phpMyAdmin 2009-02-26
SuSE SUSE-SR:2009:003 boinc-client, xrdp, phpMyAdmin, libnasl, moodle, net-snmp, audiofile, xterm, amarok, libpng, sudo, avahi 2009-02-02

Comments (none posted)

rt2400: arbitrary code execution

Package(s):rt2400 CVE #(s):CVE-2009-0282
Created:January 29, 2009 Updated:July 13, 2009
Description:

From the Debian advisory:

It was discovered that an integer overflow in the "Probe Request" packet parser of the Ralinktech wireless drivers might lead to remote denial of service or the execution of arbitrary code.

Alerts:
Gentoo 200907-08 Ralink wireless drivers 2009-07-12
Debian DSA-1714-1 rt2570 2009-01-28
Debian DSA-1713-1 rt2500 2009-01-28
Debian DSA-1712-1 rt2400 2009-01-28

Comments (none posted)

sudo: privilege escalation

Package(s):sudo CVE #(s):CVE-2009-0034
Created:January 30, 2009 Updated:January 24, 2011
Description: sudo has a privilege escalation vulnerability. From the rPath alert: In previous versions of sudo, in a non-default configuration which allows users in certain groups to run commands as other non-root users, it is possible for non-root users to inappropriately gain root privileges.
Alerts:
Mandriva MDVSA-2011:018 sudo 2011-01-21
Ubuntu USN-722-1 sudo 2009-02-17
Red Hat RHSA-2009:0267-01 sudo 2009-02-05
Fedora FEDORA-2009-1074 sudo 2009-01-29
rPath rPSA-2009-0021-1 sudo 2009-01-29
Gentoo 200902-01 sudo 2009-02-06
Mandriva MDVSA-2009:033 sudo 2009-02-04
SuSE SUSE-SR:2009:003 boinc-client, xrdp, phpMyAdmin, libnasl, moodle, net-snmp, audiofile, xterm, amarok, libpng, sudo, avahi 2009-02-02

Comments (none posted)

xdg-utils: arbitrary code execution

Package(s):xdg-utils CVE #(s):CVE-2009-0068
Created:February 3, 2009 Updated:February 4, 2009
Description: From the CVE entry: Interaction error in xdg-open allows remote attackers to execute arbitrary code by sending a file with a dangerous MIME type but using a safe type that Firefox sends to xdg-open, which causes xdg-open to process the dangerous file type through automatic type detection, as demonstrated by overwriting the .desktop file.
Alerts:
Slackware SSA:2009-033-01 xdg 2009-02-03

Comments (none posted)

xrdp: arbitrary code execution

Package(s):xrdp CVE #(s):CVE-2008-5902 CVE-2008-5903 CVE-2008-5904
Created:February 2, 2009 Updated:February 4, 2009
Description:

From the SUSE advisory:

This update fixes multiple buffer overflows that can be exploited remotely to execute arbitrary code. (CVE-2008-5902, CVE-2008-5903, CVE-2008-5904)

Alerts:
SuSE SUSE-SR:2009:003 boinc-client, xrdp, phpMyAdmin, libnasl, moodle, net-snmp, audiofile, xterm, amarok, libpng, sudo, avahi 2009-02-02

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2009, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds