Menu
Google fixes dangerous rooting vulnerabilities in Android

Google fixes dangerous rooting vulnerabilities in Android

Media processing and kernel privilege escalation flaws were patched in the January Android security update

Google has fixed a new batch of vulnerabilities in Android that could allow hackers to take over devices remotely or through malicious applications.

The company released over-the-air firmware updates for its Nexus devices Monday and will publish the patches to the Android Open Source Project (AOSP) repository by Wednesday. Manufacturers that are Google partners received the fixes in advance on Dec. 7, and will release updates according to their own schedules.

The new patches address six critical, two high and five moderate vulnerabilities. The most serious flaw is located in the mediaserver Android component, a core part of the operating system that handles media playback and corresponding file metadata parsing.

By exploiting this vulnerability attackers can execute arbitrary code as the mediaserver process, gaining privileges that regular third-party applications are not supposed to have. The vulnerability is particularly dangerous because it can be exploited remotely by tricking users into opening specifically crafted media files in their browsers or by sending such files via multimedia messages (MMS).

Google has been busy finding and patching media-file related vulnerabilities in Android since July, when a critical flaw in a media parsing library called Stagefright led to a major coordinated patching effort from Android device manufacturers and prompted Google, Samsung and LG to introduce monthly security updates.

It seems that the stream of media processing flaws is slowing down. The remaining five critical vulnerabilities fixed in this release stem from bugs in kernel drivers or the kernel itself. The kernel is the highest privileged part of the operating system.

One of the flaws was in the misc-sd driver from MediaTek and another in a driver from Imagination Technologies. Both could be exploited by a malicious application to execute rogue code inside the kernel, leading to a full system compromise that might require re-flashing the operating system in order to recover.

A similar flaw was found and patched directly in the kernel and two others were found in the Widevine QSEE TrustZone application, potentially allowing attackers to execute rogue code in the TrustZone context. TrustZone is a hardware-based security extension of the ARM CPU architecture that allows sensitive code to be executed in a privileged environment that's separate from the operating system.

Kernel privilege escalation vulnerabilities are the type of flaws that can be used to root Android devices -- a procedure through which users gain full control of their devices. While this capability is used legitimately by some enthusiasts and power users, it can also lead to persistent device compromises in the hands of attackers.

That's why Google does not allow rooting apps in the Google Play store. Local Android security features such as Verify Apps and SafetyNet are designed to monitor for and block such applications.

To make the remote exploitation of media parsing flaws harder, the automatic display of multimedia messages has been disabled in Google Hangouts and the default Messenger app since the first Stagefright vulnerability in July.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

Meet the leading female front runners of the Kiwi channel

Meet the leading female front runners of the Kiwi channel

Reseller News honoured the leading female front runners of the New Zealand channel at the 2018 Women in ICT Awards (WIICTA) in Auckland. The awards honoured standout individuals across seven categories, spanning Entrepreneur; Innovation; Rising Star; Shining Star; Community; Technical and Achievement.

Meet the leading female front runners of the Kiwi channel
Meet the top performing customer-centric Microsoft channel partners

Meet the top performing customer-centric Microsoft channel partners

Microsoft honoured leading partners across the channel following a year of customer innovation and market growth in New Zealand. The 2018 Microsoft Partner Awards recognised excellence within the context of the end-user, spanning a host of emerging and established providers.

Meet the top performing customer-centric Microsoft channel partners
Reseller News launches new-look Awards at 2018 Judges’ Lunch

Reseller News launches new-look Awards at 2018 Judges’ Lunch

Introducing the Reseller News Innovation Awards, launched to the channel at the 2018 Judges’ Lunch in Auckland. With more than 70 judges now part of the voting panel, the new-look awards will reflect the changing dynamics of the channel, recognising excellence across customer value and innovation - spanning start-ups, partners, distributors and vendors.

Reseller News launches new-look Awards at 2018 Judges’ Lunch
Show Comments