10.06.2013 Views

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

Study into the Implications of Smartphone Operating System Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Study</strong> <strong>into</strong> <strong>the</strong> implications <strong>of</strong> <strong>Smartphone</strong> operating system security<br />

Google Android<br />

Android is being labelled as <strong>the</strong> new Micros<strong>of</strong>t Windows. This is both a blessing and a curse<br />

as Micros<strong>of</strong>t Windows has been <strong>the</strong> most successful desktop operating system in <strong>the</strong> world<br />

but has been criticised for <strong>the</strong> extent <strong>of</strong> its vulnerabilities and exploits.<br />

Goode Intelligence discovered 320 unique CVE entries whilst performing a search on<br />

‘Android’ on <strong>the</strong> CVE vulnerability database. The latest CVE entry (CVE-2013-1773) was<br />

added on 19 February 2013 and was related to Linux Kernel 3.3 vulnerability 85 .<br />

As Android is based on <strong>the</strong> version <strong>of</strong> <strong>the</strong> Linux Kernel, version 3.x for Android 4.0 onwards<br />

and version 2.6 for all o<strong>the</strong>r versions, Android will share some vulnerabilities with Linux, as<br />

CVE-2013-1773 shows us.<br />

Issues with Android, including security vulnerabilities, are logged with Google via <strong>the</strong> Open<br />

Handset Alliance Project (There is an ‘Issues’ area <strong>of</strong> <strong>the</strong> website -<br />

https://code.google.com/p/android/issues/list). They will be allocated an ID and a Type<br />

(categorised <strong>into</strong> ‘Defect’ or ‘Enhancement’), along with a summary <strong>of</strong> <strong>the</strong> issue and <strong>the</strong><br />

owner. Google will analyse <strong>the</strong> issue and if it is a security vulnerability that needs<br />

remediating will schedule in <strong>the</strong> fix according to <strong>the</strong> severity <strong>of</strong> <strong>the</strong> issue.<br />

It is accepted that this process works relatively well and that Google have an adequate<br />

vulnerability management process. Where <strong>the</strong> process has problems is in <strong>the</strong> relationship<br />

between Google, <strong>the</strong> third-party handset manufacturers and <strong>the</strong> operators.<br />

Goode Intelligence believes that <strong>the</strong> critical relationship that is causing much <strong>of</strong> <strong>the</strong> issue is<br />

<strong>the</strong> Google-Android handset manufacturer relationship.<br />

As <strong>the</strong>re is a degree <strong>of</strong> customisation <strong>of</strong> Android by <strong>the</strong> handset manufacturer community<br />

<strong>the</strong>n each OEM has <strong>the</strong>ir own vulnerability management process. They will also have <strong>the</strong>ir<br />

own unique vulnerabilities. For instance in December 2012 it was widely reported 86 that<br />

Samsung had introduced a flaw in its Android Kernel implementation. The flaw, named <strong>the</strong><br />

Samsung Exynos kernel exploit, resulted in a vulnerability that could allow a malicious<br />

application to gain control over <strong>the</strong> device. Android devices that were affected included <strong>the</strong><br />

S2 and S3 Galaxy <strong>Smartphone</strong>s. Samsung acknowledged <strong>the</strong> vulnerability and posted a<br />

response:<br />

“Samsung is aware <strong>of</strong> <strong>the</strong> potential security issue related to <strong>the</strong> Exynos processor and plans<br />

to provide a s<strong>of</strong>tware update to address it as quickly as possible.<br />

The issue may arise only when a malicious application is operated on <strong>the</strong> affected devices;<br />

however, this does not affect most devices operating credible and au<strong>the</strong>nticated<br />

applications.<br />

85 You can find <strong>the</strong> CVE entry here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1773<br />

86 Samsung devices vulnerable to dangerous Android exploit (article from Computerworld).<br />

http://www.computerworld.com/s/article/9234778/Samsung_devices_vulnerable_to_dangerous_Andro<br />

id_exploit<br />

Goode Intelligence © 2013 P a g e | 88 www.goodeintelligence.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!