Sarah Perez writes"Android Vulnerability So Dangerous, Owners Warned Not To Use Phone's Web Browser". According to Washington DC Security researcher, a new vulnerability in Google's mobile OS Android allows hackers to remotely take control of the phone's web browser and related processes.
But, wait let's take a closer look at how an Android phone can be compromised. If an Android user does not utilize the media server functionality when using its web browser, can he still be at risk? According to Rich Cannings, Android Security Engineer, the Android mediaserver uses OpenCore and works within its own application sandbox so that security issues in the mediaserver would not affect other applications on the phone such as email, the browser, SMS and the dialer. He further notes that the Android vulnerability is limited to the mediaserver and could only exploit actions the mediaserver performs such as listen to and alter some audio and visual media.
"Both vulnerabilities could have been prevented if Android had the ability to block malicious code from executing in memory." One of the ways, this can be prevented is by the use of a class file verifier similar to the J2ME verifier, which could ensure that the Android bytecodes (.dex files) do not contain illegal instructions, cannot be executed in an illegal order and do not contain references to invalid memory locations, etc.