Latest Android phones hijacked with tidy one-stop-Chrome-pop

  • Thread starter Thread starter Sarkar
  • Start date Start date
  • Replies Replies: Replies 2
  • Views Views: Views 647

Sarkar

Member
Joined
1 Jun 2013
Messages
11,003
Reaction score
11,367
Google's Chrome for Android has been popped in a single exploit that could lead to the compromise of any handset.

The exploit, showcased at MobilePwn2Own at the PacSec conference in Tokyo yesterday but not disclosed in full detail, targets the JavaScript v8 engine. It can probably hose all modern and updated Android phones if users visit a malicious website.

It is also notable in that it is a single clean exploit that does not require multiple chained vulnerabilities to work, the researchers say.

Quihoo 360 researcher Guang Gong showcased the exploit which he developed over three months.

PacSec organiser Dragos Ruiu told Vulture South the exploit was demonstrated on a new Google Project Fi Nexus 6.

"The impressive thing about Guang's exploit is that it was one shot; most people these days have to exploit several vulnerabilities to get privileged access and load software without interaction, " Ruiu says.

"As soon as the phone accessed the website the JavaScript v8 vulnerability in Chrome was used to install an arbitrary application (in this case a BMX Bike game) without any user interaction to demonstrate complete control of the phone."

"The vuln being in recent version of Chrome should work on all Android phones; we were checking his exploit specifically but you could recode it for any Android target since he was hitting the JavaScript engine

A Google security engineer on site received the bug. Ruiu says it is likely that Google will pay a security bug bounty for the vulnerability since the working exploit details were not disclosed.


Latest Android phones hijacked with tidy one-stop-Chrome-pop • The Register
 
Thanks for the Informative Share @Sarkar bro :tup
 
Back
Top Bottom