all InfoSec news
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
Microsoft Security Blog www.microsoft.com
Microsoft discovered a vulnerability pattern in multiple popular Android applications that could enable a malicious application to overwrite files in the vulnerable application’s internal data storage directory, which could lead to arbitrary code execution and token theft, among other impacts. We have shared our findings with Google’s Android Application Security Research team, as well as the developers of apps found vulnerable to this issue. We anticipate that the vulnerability pattern could be found in other applications. We’re sharing this research …
android android apps application applications apps arbitrary code arbitrary code execution attack code code execution credential theft data data storage directory enable files findings google internal malicious malicious application microsoft popular remote code execution storage stream theft token token theft vulnerability vulnerable vulnerable application