Jump to content

Alternative fixes released for Android 'master key' vulnerability


nsane.forums

Recommended Posts

nsane.forums

More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system.

Security vendor Webroot and ReKey, a collaboration between Northeastern University in Boston and vendor Duo Security, released software on Tuesday that detects if an Android device is vulnerable and applies a patch.

Google, which manages the open-source Android project, quickly issued patches for the so-called "master key" vulnerabilities, one of which was found by Bluebox Security and another one that appeared on a Chinese-language forum.

But mobile phone manufacturers and operators are often very slow in releasing patches to their users, a problem that is likely to become more critical as mobile device use rises.

The result is a large number of users running vulnerable devices. More than 156 million Android smartphones were sold in the first three months of this year worldwide, amounting to a 74 percent market share, according to analyst Gartner.

The vulnerability found by Bluebox may affect more 900 million devices made over the last four years running Android versions 1.6 and higher.

The vulnerabilities are particularly dangerous since they allow an attacker to modify an Android package file, which is used to install an application, without affecting its original cryptographic signature.

The signature is generated by the application's author and is used to verify the program's integrity. By using the vulnerability and maliciously modifying an application, a hacker could gain complete control over an Android device.

ReKey is an application that applies the Google patches. It also will alert users if an application tries to install itself using the vulnerabilities. ReKey needs root access to a device, which is normally not granted to most applications, in order to patch vulnerabilities.

Webroot wrote on Tuesday that it has deployed a patch within its SecureAnywhere Mobile product, which also covers Android's Jelly Bean 4.1 and Ice Cream Sandwich releases.

Bluebox also has an application that detects if a device is vulnerable and scans for malicious applications.

In order to protect users, Google is scanning applications in its Play store to ensure those programs are legitimate. Android also has a feature, called "Verify Apps," which allows Google to vet applications before installation.

Application markets and websites not run by Google have posed a risk for Android users. Security researchers have found numerous examples of popular applications that have been modified to deliver secret code that can spy on users.

view.gifView: Original Article

Link to comment
Share on other sites

  • Replies 3
  • Views 1.6k
  • Created
  • Last Reply

found something weird... already had rekey installed, read this article and installed the bluebox app... showed system not patched... :wtf:

Link to comment
Share on other sites

stylemessiah

found something weird... already had rekey installed, read this article and installed the bluebox app... showed system not patched... :wtf:

From the ReKey FAQ:

Why does Bluebox's scanner say my device is still vulnerable?

We haven't yet analyzed what Bluebox's scanner is looking at to determine whether a device is patched or not, but it does not appear to be accurately checking whether the vulnerability is actually present or not. To be clear, ReKey will patch the vulnerability on your device, even if the Bluebox scanner does not detect the patch correctly.

To verify that your device has been patched, you can attempt to install a PoC APK to test whether it is properly blocked by ReKey. If you observe the INSTALL_PARSE_FAILED_CERTIFICATE_ENCODING error when attempting to install the PoC APK via "adb install", you are patched:

$ adb install rekey-poc.apk 2755 KB/s (64844 bytes in 0.022s)pkg: /data/local/tmp/rekey-poc.apkFailure [INSTALL_PARSE_FAILED_CERTIFICATE_ENCODING]

If you run "adb logcat" during the install process, you should see the following output indicating that ReKey has blocked the attack:

W/PackageParser(  391): java.util.zip.ZipException: duplicate zipEntry, security breach!
Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...