mobile_threat_blog_icon

Mobile Threat Blog

  • Mobile
    Security Insights
  • Mobile
    Threat Research
  • Mobile
    Security Tips
Share

On April 3, 2017 Google released an Android Security Bulletin containing details of security vulnerabilities affecting Android devices. Android security updates normally include two parts: general updates that affect most users and the updates affecting specific partners, such as hardware partners like NVIDIA, Broadcom and Qualcomm. Here we’ve summarized the general security updates on the Android Security bulletin from Security Patch level 2017-04-01.

  • 7 Information Disclosure Vulnerabilities: These vulnerabilities allow malicious apps to access user data. One is rated as high impact as its exploit can bypass an operating system protection called sandboxing which isolates an application’s data from other applications to limit the damage done by a bad app. The rest are considered medium impact. The vulnerabilities are found in Mediaserver, libskia and Factory Reset.
  • 6 Remote Code Execution Vulnerabilities: These types of vulnerabilities allow attackers to execute arbitrary codes on user devices. All of them are found in Mediaserver and considered critical, since they cause memory corruptions in privileged processes.
  • 5 Privilege Escalation Vulnerabilities: This type of vulnerability allows unprivileged processes, such as from third-party apps, to escalate privileges to the system-level bypassing the sandbox restrictions. Three are considered as high impact and two are rated as medium impact. These vulnerabilities are found in CameraBase, audio server, SurfaceFlinger, libnl and Telephony.
  • 5 Denial of Service Vulnerabilities: These types of vulnerabilities disable a user’s ability to use the phone or access certain services. They are considered high impact and found in libskia and Mediaserver.

Since there are more information disclosure vulnerabilities in this update than the last month security update, Appthority urges users to update their Android devices to the latest OS version which includes these security updates. We also recommend enterprise IT admins set strong policies against keeping outdated OS versions on their employee’s mobile devices.


Image credit: http://ourcodeworld.com/articles/read/36/how-to-self-sign-and-verify-android-application-apk-in-windows-manually

Back