Video details Android browser intercept flaw

Powered by SC Magazine
 

Users must wait for Frozen Yoghurt fix.

IBM security researchers found a vulnerability in the Android mobile operating system that could allow an attacker to intercept browser operations by injecting JavaScript on the device.

Roee Hay and Yair Amit from IBM's Rational Application Security Research Group demonstrated that a malicious, non-privileged application could break the browser URL loading process and sandbox to inject JavaScript into an arbitrary domain.

In an advisory, they said the vulnerability "has the same implications as global [cross-site scripting] attack albeit from an installed application rather than another website".

"The malicious application could also install as a service to in order to inject JavaScript code from time to time into the currently opened tab, thus completely intercepting the user's browsing experience," the researchers wrote.

Android 2.2 (Froyo) and versions 2.3.4 and 3.1 (Honeycomb) were vulnerable to the exploits.

Versions 2.3.5 (Gingerbread) and 3.2 had a fix while a release for 2.2 patches was in the pipeline.

"We would like to thank the Android security team for the efficient and quick way in which they handled this security issue," the researchers said.

Copyright © SC Magazine, Australia


Video details Android browser intercept flaw
Android fixes on the way.
 
 
 
Top Stories
Westpac interim CIO resigns
Group CIO yet to be appointed.
 
Five emerging technologies that will transform financial services
[Blog post] Far out ideas that aren't far off.
 
Earning the right to innovate
Breaking down the barriers to innovation is a long, but rewarding process, says Bank of Queensland Group CIO, Julie Bale.
 
 
Android fixes on the way.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  27%
 
Application integration concerns
  3%
 
Security and compliance concerns
  28%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  23%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  5%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 910

Vote