TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Uncovering Android Master Key That Makes 99% of Devices Vulnerable

268 pointsby whiskersalmost 12 years ago

13 comments

ctzalmost 12 years ago
This tantilising and makes me want to work out what the problem is pre-Blackhat. Looking at JAR signing in general (which is what Android packages are) I see a few possible flaws:<p>* The zip format doesn&#x27;t structurally guarantee uniqueness of names in file entries. If the APK signature verification chooses the first matching file entry for a given name, and unpacking chooses the last then you&#x27;re screwed in the way described.<p>* The JAR signing scheme signs a file containing hashes of file name&#x2F;data hash pairs. However, there seems no part of the verification steps (in the JAR specification) where <i>extra</i> files not mentioned in the signed data cause signature rejection. This seems like a bad idea.<p>From the description, though, it sounds like a key management problem. Anyway, this talk is definitely on my Blackhat schedule!
评论 #5987935 未加载
评论 #5989654 未加载
评论 #6008865 未加载
kyrraalmost 12 years ago
Maybe I&#x27;m missing something, but I don&#x27;t see this security bug could be used against a majority of people. Can someone explain to me how this exploit could be used against people?<p>To me, it seems like someone would have to side-load an application. Anything coming from the Play store should be safe?
评论 #5987331 未加载
评论 #5988345 未加载
评论 #5987501 未加载
评论 #5987426 未加载
评论 #5987481 未加载
评论 #5987802 未加载
评论 #5990009 未加载
评论 #5987343 未加载
评论 #5990119 未加载
mdanielalmost 12 years ago
Is it my imagination or is 5 months a very short disclosure window for a vulnerability that affects Androids since Donut?<p>I think about how manufacturers drag their feet on normal updates and can&#x27;t imagine what heaven and earth movement would be required to patch this industry wide.<p>Then again, maybe the attack surface for this is small enough that it&#x27;s manageable.
评论 #5987488 未加载
评论 #5987567 未加载
评论 #5987328 未加载
评论 #5987442 未加载
评论 #5987538 未加载
tenpoundhammeralmost 12 years ago
If I&#x27;m reading this correctly, this hack would potentially allow a standard app developer to create an app that has elevated permissions and thereby be able to access and transmit any data on the phone.<p>The story also says that this hack could be used to send text messages and other communications. In the wrong hands this could be a devastating financial and social exploit.
评论 #5987418 未加载
评论 #5987750 未加载
jqueryalmost 12 years ago
Yesterday I swapped my Android for an iPhone due to security concerns. No regrets.
评论 #5994012 未加载
marcelocamanhoalmost 12 years ago
This is really one of those news that just seems to be bought by Android&#x27;s competitors.<p>The user has to install a pirated APK. Also Play store is SSL secured. Just use common sense.
评论 #5988851 未加载
atestialmost 12 years ago
I don&#x27;t get why root access is so much worse than any other problem:<p>1. Apps like Skype already allow themselves access to so much sensitive and private information and things like the Motorola spyware uncovered recently (<a href="https://news.ycombinator.com/item?id=5973282" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=5973282</a> ) are so bad that I find the extra evilness possible with root access not so significant. What amount of additional harm would it really be? Intercepting network traffic? Better hidden rootkit that even hides from the few users who have jailbroken their phone?<p>2. The Linux kernel regularly has security bugs and we know that Android phone manufactures don&#x27;t update devices timely or at all. Wouldn&#x27;t every Android phone not have at least one exploit for the kernel itself at any given point in time? Where are the apps that just use this to gain root access? Or has Google hardened the kernel well enough that there are no known exploits by which an APK with native code doing syscalls can increase it&#x27;s privileges?
评论 #5989314 未加载
3JPLWalmost 12 years ago
Bluebox seems to be having some sporadic database connection problems. Here&#x27;s the Coral Cache mirror: <a href="http://bluebox.com.nyud.net/corporate-blog/bluebox-uncovers-android-master-key/" rel="nofollow">http:&#x2F;&#x2F;bluebox.com.nyud.net&#x2F;corporate-blog&#x2F;bluebox-uncovers-...</a>
dschiptsovalmost 12 years ago
So, it seems, that there is some &quot;special, less strict&quot; way to install packages for &quot;trusted vendors&quot;, because it is much less probable to find a major flaw in a standard jarsigner + zipalign procedure. If so, it is just another idiotic &quot;management decision&quot;.
brettyGoodalmost 12 years ago
Looking on the bright side, this offers a wonderful new opportunity to root your phone without rooting your phone.<p>And at what point do we stop calling these sorts of problems &quot;vulnerabilities&quot; and start calling them surrepitious &quot;back doors&quot;?
评论 #5989606 未加载
zmmmmmalmost 12 years ago
There are some weird sentences in this that make it very confusing:<p>&quot;Installation of a Trojan application from the device manufacturer&quot;<p>Ok, so the manufacturer of the device is shipping a trojan on my device. Isn&#x27;t there a bigger problem in this situation?
评论 #5988043 未加载
emmelaichalmost 12 years ago
A device manufacturer can already do whatever they want.
dallagialmost 12 years ago
Are Android apks converted to BlackBerry10 bars still vulnerable?