Google fixes dangerous rooting vulnerabilities in Android

Media processing and kernel privilege escalation flaws were patched in the January Android security update

Google has fixed a new batch of vulnerabilities in Android that could allow hackers to take over devices remotely or through malicious applications.

The company released over-the-air firmware updates for its Nexus devices Monday and will publish the patches to the Android Open Source Project (AOSP) repository by Wednesday. Manufacturers that are Google partners received the fixes in advance on Dec. 7, and will release updates according to their own schedules.

The new patches address six critical, two high and five moderate vulnerabilities. The most serious flaw is located in the mediaserver Android component, a core part of the operating system that handles media playback and corresponding file metadata parsing.

By exploiting this vulnerability attackers can execute arbitrary code as the mediaserver process, gaining privileges that regular third-party applications are not supposed to have. The vulnerability is particularly dangerous because it can be exploited remotely by tricking users into opening specifically crafted media files in their browsers or by sending such files via multimedia messages (MMS).

Google has been busy finding and patching media-file related vulnerabilities in Android since July, when a critical flaw in a media parsing library called Stagefright led to a major coordinated patching effort from Android device manufacturers and prompted Google, Samsung and LG to introduce monthly security updates.

It seems that the stream of media processing flaws is slowing down. The remaining five critical vulnerabilities fixed in this release stem from bugs in kernel drivers or the kernel itself. The kernel is the highest privileged part of the operating system.

One of the flaws was in the misc-sd driver from MediaTek and another in a driver from Imagination Technologies. Both could be exploited by a malicious application to execute rogue code inside the kernel, leading to a full system compromise that might require re-flashing the operating system in order to recover.

A similar flaw was found and patched directly in the kernel and two others were found in the Widevine QSEE TrustZone application, potentially allowing attackers to execute rogue code in the TrustZone context. TrustZone is a hardware-based security extension of the ARM CPU architecture that allows sensitive code to be executed in a privileged environment that's separate from the operating system.

Kernel privilege escalation vulnerabilities are the type of flaws that can be used to root Android devices -- a procedure through which users gain full control of their devices. While this capability is used legitimately by some enthusiasts and power users, it can also lead to persistent device compromises in the hands of attackers.

That's why Google does not allow rooting apps in the Google Play store. Local Android security features such as Verify Apps and SafetyNet are designed to monitor for and block such applications.

To make the remote exploitation of media parsing flaws harder, the automatic display of multimedia messages has been disabled in Google Hangouts and the default Messenger app since the first Stagefright vulnerability in July.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Essentials

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?