Android Security Fixes

Thursday, January 12, 2017 @ 03:01 PM gHale


There are critical vulnerabilities that could enable remote code execution on affected Android devices through multiple methods such as email, web browsing, and MMS when processing media files, according to the January Android security bulletin.

There are no reports of active exploitation or abuse of these newly reported issues. Along with releasing a bulletin, Google released an over-the-air (OTA) security update.

RELATED STORIES
Android Trojan Targets WiFi Network
Trojan can Bypass Virtual Environment
Android Devices Packed with Trojans
PowerShell Used in Malware Attack

This month’s bulletin has two security patch level strings:

2017-01-01: Partial security patch level string. This security patch level string indicates all issues associated with 2017-01-01 (and all previous security patch level strings).

2017-01-05: Complete security patch level string. This security patch level string indicates all issues associated with 2017-01-01 and 2017-01-05 (and all previous security patch level strings).

In addition, supported Google devices will receive a single OTA update with the January 05, 2017 security patch level.

In 2017-01-01, a remote code execution vulnerability in Mediaserver received a critical grade and it could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated critical because of the possibility of remote code execution within the context of the Mediaserver process.

In addition, there are a slew of vulnerabilities receiving rating of high to moderate.

In the 2017-01-05 security patch level, there were a series of critical vulnerabilities

An elevation of privilege vulnerability in the kernel memory subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device.

In addition, there is an elevation of privilege vulnerability in the Qualcomm bootloader that could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device.

Also, there is an elevation of privilege vulnerability in the kernel file system that could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device.

There is an elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.

An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device.

Click here for more information on all the vulnerabilities.



Leave a Reply

You must be logged in to post a comment.