Improper installation of unsigned code
ID: ANDROID-8219321
Severity: High
Affected versions: Android 2.0 and greater
An inconsistency in the handling of zip files during application installation may lead to the installation and execution of unsigned code in a privileged context.
This issue will be publicly disclosed in 90 days. A CTS test will be included in the next CTS release.
5月:
Insertion of arbitrary code without changing package signature due to incorrect parsing of APKs (update to previous bulletin)
First published: March 4th, 2013
Last Updated: May 31st, 2013
ID: ANDROID-8219321
Severity: High
Affected Android Versions: all
Arbitrary code can be inserted into an APK and pass signature verification due to incorrect parsing of APKs. A maliciously crafted classes.dex can be inserted before a legitimately signed classes.dex in an APK. Signature verification will be performed on the second, legitimate classes.dex, but the first, malicious classes.dex is installed for application use.
Update: This issue will be publicly presented at Blackhat 2013. Please see 7c1K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3u0D9j5h3y4C8K9r3q4@1i4K6u0W2j5$3!0E0i4K6u0r3N6i4y4Q4x3X3b7I4x3#2)9J5c8X3u0J5K9h3g2X3K9h3&6Y4M7#2)9J5k6h3S2@1L8h3I4Q4x3U0y4r3L8%4u0J5K9i4y4@1j5h3I4Q4x3U0k6F1j5Y4y4H3i4K6y4n7k6X3!0J5i4K6t1$3L8X3u0K6M7q4)9K6b7X3#2G2M7X3g2Q4x3U0k6F1j5Y4y4H3i4K6y4n7k6r3g2@1j5h3W2D9M7#2)9J5k6g2)9J5y4X3&6T1M7%4m8Q4x3@1u0m8N6q4)9J5y4X3&6T1M7%4m8Q4x3@1u0@1K9r3q4@1i4K6t1$3L8X3u0K6M7q4)9K6b7Y4c8A6L8h3g2Q4x3V1y4Q4x3U0k6F1j5Y4y4H3i4K6y4n7N6$3g2Q4x3U0k6F1j5Y4y4H3i4K6y4n7k6i4S2H3k6h3y4@1i4K6t1$3L8X3u0K6M7q4)9K6b7X3q4U0N6r3W2$3k6g2)9J5y4X3&6T1M7%4m8Q4x3@1u0H3N6h3u0D9K9h3y4Q4x3U0k6F1j5Y4y4H3i4K6y4n7k6i4S2H3L8r3!0A6N6r3q4@1K9h3!0F1i4K6t1$3L8X3u0K6M7q4)9K6b7X3!0X3i4K6t1$3L8X3u0K6M7q4)9K6b7Y4c8Z5K9i4y4Q4x3U0k6F1j5Y4y4H3i4K6y4n7K9i4y4K6N6h3g2Q4x3U0k6F1j5Y4y4H3i4K6y4n7L8%4g2@1M7$3W2V1k6g2)9J5y4X3&6T1M7%4m8Q4x3@1u0G2k6W2)9J5y4X3&6T1M7%4m8Q4x3@1u0s2L8$3!0Y4L8r3g2Q4x3U0k6F1j5Y4y4H3i4K6y4n7f1r3I4S2P5g2)9J5k6b7`.`.