Over 86% of Android devices are at risk due to a new vulnerability

TECHi's Author Jesseb Shiloh
Opposing Author Arstechnica Read Source Article
Last Updated
TECHi's Take
Jesseb Shiloh
Jesseb Shiloh
  • Words 111
  • Estimated Read 1 min

A serious code-execution vulnerability in Android 4.3 and earlier was patched in KitKat, the latest version of the operating system. Researchers at IBM this week disclosed the nature of the vulnerability, which was privately disclosed to the Android Security Team in September and patched last November. “Considering Android’s fragmented nature and the fact that this was a code-execution vulnerability, we decided to wait a bit with the public disclosure,” said Roee Hay, a security research group leader at IBM. Hay’s team found a stack-based buffer overflow vulnerability in Android’s KeyStore service, which according to the Android developers’ website is responsible for storing and securing a device’s cryptographic keys.

Arstechnica

Arstechnica

  • Words 247
  • Estimated Read 2 min
Read Article

Researchers have warned of a vulnerability present on an estimated 86 percent of Android phones that may allow attackers to obtain highly sensitive credentials, including cryptographic keys for some banking services and virtual private networks, and PINs or patterns used to unlock vulnerable devices. The vulnerability resides in the Android KeyStore, a highly sensitive region of the Google-made operating system dedicated to storing cryptographic keys and similar credentials, according to anadvisory published this week by IBM security researchers. By exploiting the bug, attackers can execute malicious code that leaks keys used by banking and other sensitive apps, virtual private network services, and the PIN or finger patterns used to unlock handsets. The advisory said Google has patched the stack-based buffer overflow only in version 4.4, aka KitKat, of Android. The remaining versions, which according to Google figures run 86.4 percent of devices, have no such fix. There are several technical hurdles an attacker must overcome to successfully exploit the vulnerability. Android is fortified with modern software protections, including data execution prevention and address space layout randomization, both of which are intended to make it much harder for hackers to execute code when they identify security bugs. Attackers would also have to have an app installed on a vulnerable handset. Still, the vulnerability is serious because it resides in KeyStore, arguably one of the most sensitive resources in the Android OS. In an e-mail, Dan Wallach, a professor specializing in Android security in the computer science department of Rice University, explained:

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Arstechnica

Apple won’t be announcing its television service next week after all
Apple won’t be announcing its television service next week after all

Those of you who have been anticipating the announcement of Apple's long-rumored subscription television service should prepare yourselves for disappointment.…

Kyocera is being sued by Microsoft for infringing on Android patents
Kyocera is being sued by Microsoft for infringing on Android patents

Despite being a direct competitor in the mobile market, Microsoft actually owns quite a few Android patents and isn't afraid…

Maybe default encryption for Android wasn’t such a good idea
Maybe default encryption for Android wasn’t such a good idea

While Android has supported disk encryption for a while now, Android 5.0 is the only version that implements it by…

The FCC has approved America’s strongest-ever net neutrality rules
The FCC has approved America’s strongest-ever net neutrality rules

The strongest net neutrality rules that the United States has ever seen were approved by the FCC in a highly-anticipated…