Tuesday, October 25, 2016

Dutch researchers find big security flaw in Android … – NU.nl

It is a mobile application of the previously found Rowhammer-bug, which have hitherto been as harmless for mobile devices was seen.

Researchers Herbert Bos, Victor van der Veen, and Kaveh Razavi mention the Android version Pusher. They will present their find on Wednesday during a cybersecurityconferentie in Vienna.

To the vulnerability to abuse is a part of the DRAM memory is repeatedly read out until, in a nearby area a ‘bit-flip‘ occurs, where a 0 changes to 1 or vice versa. “If that is the case, you as the attacker, basically all over,” says Van der Veen against NU.nl.

The attack can be combined with earlier Android leak as Stagefright to control a device to take over. That can be done from an app that the user has no special permissions.

Secret services

Really easy is the leak not to abuse it, says Van der Veen. He sees it therefore as unlikely that criminals here on a large scale misuse of will.

“I would say rather that this is something that a secret service could do to someone in a highly targeted attack.”

Devices

It is not known exactly which Android devices are vulnerable to the Pusher-attack. Also between different copies of a single phone model can vary. As tested, the researchers of the VU fifteen copies of the LG Nexus 5. Thereof there were twelve vulnerable to the attack.

“Even if you have two chips of the same manufacturer, it may be that for one reason or another, the one chip will be vulnerable and the other not,” says Van der Veen. “Exactly how that may be, this is where we need more research to do.” May be chips more vulnerable to the extent they are more are used, he says.

Android users from Google Play download an app that shows or their own device is vulnerable.

Google is going to leak in Android-security update of november jams. Completely fixed the vulnerability yet. The researchers suspect that a new way can be devised for the ram is still abuse. That is, however, a lot more difficult.

By: NU.nl/Jeroen Crane

LikeTweet

No comments:

Post a Comment