TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Android 0-day vulnerability – Drive by download

7 pointsby Usuabout 10 years ago

2 comments

cpncrunchabout 10 years ago
No, this is nothing new. The user is in fact manually downloading the app and accepting the permissions. The app then maliciously connects to a server and runs commands without the user knowing. However we already knew that this was possible in Android. It's not a 'zero day vulnerability' or a 'drive by download' at all. Just another example of why you need to be careful what you download on Android.
评论 #9421970 未加载
millstoneabout 10 years ago
My reading of the vulnerability is that you have some app with few permissions, that then triggers installing an app with many permissions. The user is presented with a confirmation dialog for this installation. However, the low-permission app can overlay a window on top of this dialog, showing any content it likes, and this window can be configured to pass touch events through. So the user thinks he is interacting with this overlay window but is in reality confirming the installation of the new app.