This one can be exploited by a remote attacker to execute arbitrary code on the affected device. In order to exploit this issue, an attacker needs to trick a victim into visiting a maliciously crafted website. As we know that Android devices do not support https out-of-the-box. So in order to exploit this issue an attacker must have a server with a https port that can be accessed by the victim.
Once the attacker has setup a server with a https port, the next step is to setup a fake certificate on the server with the same name as the hostname of the server.
Now connect to the server with the fake certificate, in order to setup the https connection, the victim’s device will ask the server to present a certificate.
Once the connection is setup, the attacker’s server will serve the malicious httpd binary. This binary will have its buffer overflow vulnerability.
Google Android XML Core Services (Android.XML)
This vulnerability is a buffer overflow in the Android XML Core Services library. This library provides functionality for serializing/deserializing XML data, and for parsing and generating XML content. The vulnerability exists in the libxml2 version used by default on all Android devices, including those with custom ROMs (such as CyanogenMod).
The vulnerability can be exploited via a specially crafted HTML document which, when opened, will result in a crash of the browser process.
Once this occurs the attacker will have full control of the device and can execute their own malicious code to gain root access.
HttpServer Page httpd can be accessed from the hostname of the server or from the IP address of the server. So an attacker could either setup a fake https certificate on their server with that hostname, or use an http proxy to access it.
This vulnerability is present in pre-4.4 versions of the Android device firmware.
Android-based attacks – Device fingerprinting
One of the most popular targets for an attacker is Android devices because they have so many vulnerabilities. These vulnerabilities can range from bypassing the lockscreen, to exploiting software bugs, to using a man-in-the-middle attack.
Published on: 09/08/2022 00:15:00 UTC
Last modified on: 09/09/2022 15:08:00 UTC