This week's Android security hole of note is a newly discovered flaw in all versions of Google's Android OS for that could let Bad Guys execute Denial of Service (DoS) attacks and disable users' smartphones and tablets in two minutes or less.
The "previously unknown" exploit was identified by a handful of Italian professors and security researchers representing the Artificial Intelligence Laboratory at the University of Genoa, Italy, and it supposedly "allows a malicious application to force the system to fork an unbounded number of processes…thereby mounting a Denial-of-Service (DoS) attack that makes the device totally unresponsive. Rebooting the device does not necessarily help as a (very) malicious application can make herself launched [sic] at boot-time."
The exploit was tested and verified on a number of devices including Samsung's Galaxy S and Galaxy Tab 7.1, LG's Optimus One and the HTC Desire HD, according to the researchers. The group has reportedly notified Google of the security flaw, and the hole will be patched, using one of the fixes described in the research paper, in an upcoming Android software update.
From the research paper:[indent]
"We presented a previously undisclosed vulnerability on Android devices which is the first vulnerability on Android that leads to a DoS attack of this severity. We also developed a sample malicious application, (i.e. DoSCheck) which exploits the vulnerabilities, and we proposed two fixes for securing the Android OS against the vulnerability. We reported such vulnerability to Android security team which will include a patch in an upcoming update of the Android OS. Furthermore, we plan to publicly release both DoSCheck code and patched systems in the very near future, accordingly with a responsible disclosure policy we are discussing with Android group and Open Handset Alliance."
- Two fixes
The team offered two fixes, the first of which checking if the specific process comes from a legal source, one being the System Server, and the second restricting the permissions on the target socket at the Linux layer.
Google, faced with the need to ensure the bug was fixed soonest, had to use the fix provided in the paper. The Next web said Google will roll out the fix in future Android OS updates.
Source; The Next Web
Click here to view the article