Video details Android browser intercept flaw

Powered by SC Magazine
 

Users must wait for Frozen Yoghurt fix.

IBM security researchers found a vulnerability in the Android mobile operating system that could allow an attacker to intercept browser operations by injecting JavaScript on the device.

Roee Hay and Yair Amit from IBM's Rational Application Security Research Group demonstrated that a malicious, non-privileged application could break the browser URL loading process and sandbox to inject JavaScript into an arbitrary domain.

In an advisory, they said the vulnerability "has the same implications as global [cross-site scripting] attack albeit from an installed application rather than another website".

"The malicious application could also install as a service to in order to inject JavaScript code from time to time into the currently opened tab, thus completely intercepting the user's browsing experience," the researchers wrote.

Android 2.2 (Froyo) and versions 2.3.4 and 3.1 (Honeycomb) were vulnerable to the exploits.

Versions 2.3.5 (Gingerbread) and 3.2 had a fix while a release for 2.2 patches was in the pipeline.

"We would like to thank the Android security team for the efficient and quick way in which they handled this security issue," the researchers said.

Copyright © SC Magazine, Australia


Video details Android browser intercept flaw
Android fixes on the way.
 
 
 
Top Stories
Australia's godfather of agile
Few technology leaders have seen the forces of digital disruption so repeatedly and at such close quarters than Nigel Dalton, CIO of the REA Group.
 
Photos: Innovation sprouts up among the lettuces
Inside the 21st Century farms managed from a smartphone.
 
Slow progress in Turnbullistan
[Blog post] How has the NBN moved ahead since regime change?
 
 
Android fixes on the way.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  23%
 
Application integration concerns
  3%
 
Security and compliance concerns
  31%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  24%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 587

Vote