Feeds

HTC to plug private data backdoor leak slurp vuln

Fix on the way for promiscuous Droid system app

SANS - Survey on application security programs

HTC has admitted some of its Android handsets have a flaw which could allow malicious apps to read customer locations and account details, but a fix is on the way.

The flaw was spotted last week and HTC were alerted to the flaw; now the mobe maker has admitted the problem exists and is working towards developing a fix that will be pushed out to handsets as soon as it's properly tested.

The vulnerability stems from HTC's decision to log user activity using an application which was, itself, unsecured. Applications that successfully asked for internet privileges could access the logging application and slurp details of user accounts and locations as well as various bits of system information.

The flaw was spotted by one Trevor Eckhart, who dropped HTC a line and gave the company five days to respond before taking the matter public, on the grounds of responsible disclosure, with a detailed breakdown of the vulnerability and some demonstration code.

HTC is keen to point out that they've no evidence of anyone exploiting the vulnerability, at least not yet, and that it is "working very diligently to quickly release a security update that will resolve the issue on affected devices". That patch will be sent out over the air once its been given the green light by testers, so HTC users should expect to see it soon.

Until then they might like to hold off installing applications which ask for internet privileges, though that is most of them these days. HTC reckons customers should avoid "installing and updating applications from untrusted sources", but given the security of Google's Marketplace relies entirely on peer reporting it might be better to hold off installing any unknown brands until the fix is in. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.