Jump to content

Major Android vulnerability gives apps access to sensitive data without permission


DaMan

Recommended Posts

<center><a href="http://www.bgr.com/2012/04/11/major-android-vulnerability-gives-apps-access-to-sensitive-data-without-permission"><img class="size-full wp-image-108796 aligncenter" title="Sad-Android-Robot110" src="http://www-bgr-com.vimg.net/wp-content/uploads/2011/10/Sad-Android-Robot110.jpeg" alt="" width="650" height="406" /></a></center>

The security of the Android mobile platform has always been a topic of debate. Due to Google’s open ecosystem and less invasive app policing policies, researchers argue that the <a href="http://www.bgr.com/2012/03/06/google-announces-google-play-to-replace-android-market-video/">Google Play marketplace</a> is home to numerous malicious apps. Reports have surfaced over the past few years that claimed even applications from legitimate companies — such as <a href="http://www.bgr.com/2011/08/12/facebook-stole-every-contact-and-phone-number-in-your-phone-heres-how-to-undo-the-damage/">Facebook</a>, Skype and Path — were <a href="http://www.bgr.com/2012/02/07/popular-path-app-revealed-to-secretly-upload-all-iphone-contacts-to-its-servers/">exploiting Android permissions and secretly accessing data</a>. Paul Brodeur of Leviathan Security had a simple question: what data can an app access when it has no permissions? What he found may be shocking. <span id="more-135245"></span>

Brodeur created a special Android application that explores what data can be harvested from a device when the app has no permissions. The researcher found that his application was able to access the SD card, various system information and unique handset identification data. Access to the SD card provided Brodeur with information to all files that were not hidden, including photos, backups and any external configuration files. He states, however, that “while it’s possible to fetch the contents of all those files, I’ll leave it to someone else to decide what files should be grabbed and which are going to be boring.”

The second slew of information the application was able to access was located in the /data/system/packages.list file, which allowed the software to determine what apps are currently installed on a device. Brodeur was also able to scan each installed application’s directory to determine whether sensitive data could be read and accessed. This feature could be used by malware in an attempt to find apps with weak-permission vulnerabilities.

The last piece of information Brodeur’s application was able to gather regards a handset’s identifiable information. Without the “PHONE_STATE” permission, an application is not able to read the International Mobile Equipment Identity (IMEI) or International Mobile Subscriber Identity (IMSI). With no permissions, however, Brodeur’s app was still able to access the GSM and SIM vendor IDs. The researcher was also able to access the /proc/version pseudofile, which reveals the kernel version, Android ID and name of the custom ROM installed, if there is one.

Brodeur cautions Android users about suspicious applications, claiming any installed app can execute these actions without any user interaction or permissions. The researcher goes on to note that even without an Internet permission, he was able to use something called the URI ACTION_VIEW Intent to open a browser and export any collected data.

The researcher’s application was tested on Android 4.0.3 Ice Cream Sandwich and Android 2.3.5 Gingerbread.

<a href="http://leviathansecurity.com/blog/archives/17-Zero-Permission-Android-Applications.html">Read</a>

<img src="http://feeds.feedburner.com/~r/TheBoyGeniusReport/~4/fYg3DGo_3mY" height="1" width="1"/>

 

Via BRG - Boy Genius Report

Link to comment
Share on other sites

  • Replies 0
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...