Google fixes dangerous rooting vulnerabilities in Android

Media processing and kernel privilege escalation flaws were patched in the January Android security update

Google has fixed a new batch of vulnerabilities in Android that could allow hackers to take over devices remotely or through malicious applications.

The company released over-the-air firmware updates for its Nexus devices Monday and will publish the patches to the Android Open Source Project (AOSP) repository by Wednesday. Manufacturers that are Google partners received the fixes in advance on Dec. 7, and will release updates according to their own schedules.

The new patches address six critical, two high and five moderate vulnerabilities. The most serious flaw is located in the mediaserver Android component, a core part of the operating system that handles media playback and corresponding file metadata parsing.

By exploiting this vulnerability attackers can execute arbitrary code as the mediaserver process, gaining privileges that regular third-party applications are not supposed to have. The vulnerability is particularly dangerous because it can be exploited remotely by tricking users into opening specifically crafted media files in their browsers or by sending such files via multimedia messages (MMS).

Google has been busy finding and patching media-file related vulnerabilities in Android since July, when a critical flaw in a media parsing library called Stagefright led to a major coordinated patching effort from Android device manufacturers and prompted Google, Samsung and LG to introduce monthly security updates.

It seems that the stream of media processing flaws is slowing down. The remaining five critical vulnerabilities fixed in this release stem from bugs in kernel drivers or the kernel itself. The kernel is the highest privileged part of the operating system.

One of the flaws was in the misc-sd driver from MediaTek and another in a driver from Imagination Technologies. Both could be exploited by a malicious application to execute rogue code inside the kernel, leading to a full system compromise that might require re-flashing the operating system in order to recover.

A similar flaw was found and patched directly in the kernel and two others were found in the Widevine QSEE TrustZone application, potentially allowing attackers to execute rogue code in the TrustZone context. TrustZone is a hardware-based security extension of the ARM CPU architecture that allows sensitive code to be executed in a privileged environment that's separate from the operating system.

Kernel privilege escalation vulnerabilities are the type of flaws that can be used to root Android devices -- a procedure through which users gain full control of their devices. While this capability is used legitimately by some enthusiasts and power users, it can also lead to persistent device compromises in the hands of attackers.

That's why Google does not allow rooting apps in the Google Play store. Local Android security features such as Verify Apps and SafetyNet are designed to monitor for and block such applications.

To make the remote exploitation of media parsing flaws harder, the automatic display of multimedia messages has been disabled in Google Hangouts and the default Messenger app since the first Stagefright vulnerability in July.

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Father’s Day Gift Guide

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?