Microsoft Issues Alert on ‘Dirty Stream’ Android Security Threat
In a recent revelation, Microsoft has identified a new Android security vulnerability known as the ‘Dirty Stream’ attack. This security gap could potentially allow nefarious applications to overwrite files within another app’s private directory, leading to unauthorized code execution and the theft of sensitive data.
The root of the ‘Dirty Stream’ issue lies in the misuse of Android’s content provider system, which is designed to manage and facilitate the sharing of structured data between different applications. Despite the system’s inherent security protocols to thwart unauthorized access, Microsoft’s investigation uncovered that incorrect implementation of ‘custom intents’ could sidestep these safeguards.
Custom intents, as explained by
Microsoft’s researchers have pointed out that flawed implementations of the content provider system are widespread, affecting applications that cumulatively boast over 4 billion installations. Notably, at least four of these applications have been downloaded more than 500 million times each. Microsoft cited two prominent examples with extensive user bases: Xiaomi’s File Manager, with over 1 billion installations, and WPS Office, which has been installed over 500 million times.
Upon discovering the flaw, Microsoft reported that both Xiaomi and the developers of WPS Office were cooperative and have since released updates to rectify the security vulnerability.
Following suit, Google has taken steps to amend its app security guidelines, emphasizing typical errors in content provider system implementations. Additionally, an article has been published on the Android Developers website detailing Microsoft’s findings, with the aim of encouraging developers of susceptible apps to issue updates that address the ‘Dirty Stream’ vulnerability.
For Android users, the primary line of defense against such security flaws is to ensure their applications are regularly updated. Moreover, users should exercise caution when downloading apps, particularly from sources outside the Google Play Store, where security vetting may not be as rigorous.
Source: Microsoft Via: Bleeping Computer