Researcher warns of critical Google bug in G1 phone

Google silent on details of bug and status of any forthcoming patch.

A noted security researcher Monday warned users of T-Mobile's G1 smart phone that a critical vulnerability in Google's Android operating system could be used to hack their phones.

Led by Charlie Miller, a researcher who has rooted out high-profile bugs in Apple's Mac OS X and iPhone, a team from Independent Security Evaluators (ISE) identified the bug and reported it to Google last week. ISE is a Baltimore-based security consultancy where Miller works.

Miller, who declined to get specific about the vulnerability, said only that it is a buffer overflow bug that could be exploited by tricking G1 users into visiting malicious sites. "There's a chance that the attacker could execute malicious code remotely" with the same privileges as the user of the phone's browser, Miller said.

T-Mobile started shipping the G1 shortly before the Oct. 22 launch date; the phone is the first powered by Google's open-source mobile phone operating system, Android.

Miller said that after alerting Google, a security researcher from its Android team contacted him for more information, and to ask that he withhold information until a patch was in place. Miller refused to wait, but promised not to disclose any details or technical information that could be used by hackers.

"People should know that there's a problem with the G1 before they buy it," Miller said as he defended his actions. "I don't want to help the bad guys either, but people should have all the information before they make a decision to buy [the phone]. I think I'm totally in the right here."

Google did not respond to a request for comment, or to questions about the status of any patch for Android and the G1.

Miller also said that he and others at ISE had crafted a working exploit, but would not release it until a patch is in hand.

According to a more detailed warning on the ISE site, the flaw is within one of the more than 80 different open-source packages used by Google to assemble Android. Miller blamed the bug on Google's use of outdated code. "This particular security vulnerability that affects the G1 phone was known and fixed in the relevant software package, but Google used an older, still vulnerable version," said the ISE alert.

Miller declined to name the specific open-source package at fault.

Google has been caught in the same bind before. Because it used an older version of WebKit, the open-source rendering engine that also powers Apple's Safari, for the foundation of its own Chrome Web browser, users were at risk from attacks based on a months-old flaw that had been dubbed the "carpet bomb" bug.

Google patched the carpet bomb vulnerability in a development build of Chrome two weeks ago.

Miller is well known in the Mac and iPhone vulnerability research community, and was on the same three-man ISC team that spotted and reported the first bug in Apple's iPhone shortly after it launched in mid-2007. Several months before that, he walked off with a $10,000 prize in an inaugural hacking contest by cracking an Apple laptop running Mac OS X in less than two minutes.

"I like the iPhone," said Miller, "but the G1 actually has a lot better security. In Android, Google uses this compartmentalized security architecture, application sandboxing really, so that each app runs as its own user and can access only its own files. So even though I can exploit the browser, I can't read the person's e-mail."

But even though it boasts stronger security, the G1 is still dangerous, Miller said, blaming user naivete.

"People are trained to be careful when they're browsing from the desktop or laptop, but hand them a phone and all the rules seems to go out the window," Miller said. "They use [their smart phone] to do everything they do on the desktop, but they forget they can get into trouble browsing from their phone."

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags g1

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Gregg Keizer

Computerworld
Show Comments

Cool Tech

Breitling Superocean Heritage Chronographe 44

Learn more >

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?