Security researchers have uncovered a flaw in the way Android is implemented on many handsets, making it possible for attackers to to record phone calls, send SMS messages and access user data.
The computer scientists from North Carolina State University tested handsets from several manufacturers, including Samsung, HTC and Motorola and were “surprised to find out these stock phone images do not properly enforce the permission-based security model”, they reported in a paper.
In the absence of an apps vetting process, Android phones rely on a permission-based security model that requires each application to explicitly request permissions before it can be installed.
According to the researchers, they used "interprocedural data flow analysis" techniques to expose possible capability leaks where an untrusted app could gain unauthorised access to sensitive data or privileged actions.
Using a tool dubbed Woodpecker, the researchers found that of the 13 permissions run through the process, 11 of them could be exploited, with one individual phone leaking up to eight permissions.
“These leaked capabilities can be exploited to wipe out the user data, send out SMS messages to premium numbers, record user conversation, or obtain the user’s geo-location data on the affected phones – all without asking for any permission,” the researchers said.
This article originally appeared at pcpro.co.uk
Copyright © PC Pro, Dennis Publishing
Issue: 315 | May 2013
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.