Перейти к содержанию
Viktor

Pre-Installed Backup Software on LG Android Phones Vulnerable to Root Exploit

Recommended Posts

Viktor
A vulnerability in backup software installed on some LG Android smartphones could enable an attacker with access to the device to gain root privileges.

Sprite Software’s AndroidBackup tool is installed by OEM on a number of LG Optimus, Mach, Lollipop, and Prada devices. The backup tool, in conjunction with its spritebud daemon, can be exploited to enable an attacker to run code locally on an Android device.

LG and Sprite Software were informed by researcher Justin Case of a half-dozen vulnerabilities, including at least one more serious than this one, Case told Threatpost. After numerous attempts to contact LG, the company told Case that it was preparing a solution and asked for a copy of his exploit, Case said. Sprite, meanwhile, has prepared a fix and said it is waiting for LG to release it.

“It’s complete privilege escalation to root on everything,” Case said. “I can run anything I want.”

Case’s exploit does require local access to the device and for the user to initiate a restore on the phone.

“Any issue that allows one to escalate to root is a problem,” said Jeff Forristal, CTO at Bluebox, a mobile security firm. “The fact that is an LG specific issue points to the vulnerabilities that can be introduced by device partners working with the AOSP [Android Open Source Project].”

The Backup tool is the front end of the tool while spritebud is the service doing backup and resotre on the phone. The daemon runs as the root user and accepts instructions from backup. Case wrote a specially crafted backup that enables him to write new files, or change permissions or ownership on any file.

“I crafted a backup that when it restores, creates a lag long enough for my app to set up a symlink, or shortcut. When the first file restores, it creates a directory and writes a 50 MB file to increase the lag,” Case explained. “Then it dumps another script that roots the device and executes script in the kernel for me.”

Case also said that an attacker could replace previous backups with their modified backup and wait for the user to restore the phone.

“There’s no reason [for the backup app to be on the device]. Android’s built-in backup works wonderfully,” Case said. “This is a complete nightmare. Some apps should not restore backups for a number of security reasons. You could dump all kinds of information from it.”

Version 2.5.4105 of Backup and 1.3.24 of spritebud are affected.

“This exploit boils down to bad filesystem permissions on a local Unix socket used to communicate to a root-owned process that copies files onto the file system (the restore operation),” Bluebox’s Forristal said. “Combining it with a symlink attack that leverages the hotplug daemon, they wind up getting root privileges.”

Источник

Поделиться сообщением


Ссылка на сообщение
Поделиться на другие сайты

  • Сообщения

    • santy
      Приветствую, SQx Скажи, в данной системе новые задачи (создаваемые из под Wn11), тоже попадали в папку C:\Windows\System32\Tasks_Migrated или в стандартную C:\Windows\System32\Tasks?
    • SQx
      Здравствуйте,

      Нам недавно попалась интересная тема на cyberforum, в которой дефендер находил вредоносную активность, но при этом утилитам нам не удалось найти.

      Как оказалось майнер восстанавливался из планировщика задач, но не стандартного, а мигрированого: C:\Windows\System32\Tasks_Migrated\Microsoft\Windows\Wininet Хотел бы уточнить у Вас,  если можете добавить его в uVS.

      P.S. Есть идея, что при апгрейде системы в случае если задачи корректно не перенеслись,  появиляется папка Tasks_Migrated. 

      Спасибо.
    • Ego Dekker
      Домашние антивирусы ESET были обновлены до версии 15.2.11.
    • PR55.RP55
    • PR55.RP55
      Microsoft  в Win11 ( на канале Dev.) - добавила новую функцию, позволяющую получить полный список приложений, которые в последнее время запрашивали доступ к конфиденциальной информации, включая камеру, микрофон и контакты. Новая функция также отслеживает программы, получившие за последнюю неделю доступ к данным местоположения, телефонным звонкам, переписке и скриншотам. https://www.comss.ru/page.php?id=10641 Возможно функция (  или её дальнейшее развитие ) будут полезны.      
×