by chetangole on 9/21/15, 7:09 AM with 143 comments
by mehrdada on 9/21/15, 8:36 AM
With this security architecture, no bug in the password "gatekeeper UI" can lead to you being able to read the protected information if the device gets locked successfully.
by ngcazz on 9/21/15, 10:32 AM
by junto on 9/21/15, 10:41 AM
When it came to the design of their gearbox, the work was outsourced (as much of it is in F1 unless you are Ferrari).
The primary gearbox designer did most of the work, however reverse gear proved to be a problem, but rather than fix the problem, it was left to the junior designer who couldn't solve it either, who also left it pretty much unfunctional. This was based on the concept that:
a) Reverse is rarely (if ever needed) (sidenote: disqualified if used in the pits during a race)
b) The "pit dodger" team was unlikely to last the entire race anyway, so the gearbox didn't need to standup to a full race duration anyway. The effort put in to designing the components (i.e. precision) can be reduced to match the expectation of success and failure rate of other third party components. Design and production time can be saved and extra profit made.
Thus lies the lesson of the emergency call feature, or any other feature that designers feel don't really require that much attention because they are rarely used. These features are often handed to junior developers and engineers, because of the fact that people have a tendency to deem lesser-used features as unimportant.
Which is fine of course until you have an emergency and you desparately need to make that emergency call because your, or someone else's life, depends on it. Or you need to reverse out of the way of a damn F1 car coming towards you at 150mph down a straight and you are sitting in the middle of the track. WTF, reverse doesn't engage....oh shiiiiiiit....
TLDR: Features that are very infrequently used are not always the features of least importance.
by tombrossman on 9/21/15, 8:13 AM
The original vulnerability is here, for those preferring to skip CNN and go straight to it: http://sites.utexas.edu/iso/2015/09/15/android-5-lockscreen-...
by ignoramous on 9/21/15, 8:29 AM
I wonder if the actual fix is to have the "watchdog" ping the Keyguard's process for a heartbeat like it does so with other services within the system_server... That way, any flaw / crash in Keyguard and you essentially loose access to the OS too (until it come backs up from the reboot, and starts from a clean slate).
by billpg on 9/21/15, 9:50 AM
So never then.
by paws on 9/21/15, 8:58 AM
Making exploitation much easier was how around the same time Cocoa widgets got emacs-style bindings like ctrl-k, ctrl-y, ctrl-a. Through combining these shortcuts an attacker could quickly and exponentially increase the input string length.
I never saw it documented online but I remember applying this same trick to logonwindow and OS X dropping into the so-called 'secret >console mode' -- full screen terminal, Linux-style.
Background: https://www.securemac.com/macosx-screensaver-security.php
by userbinator on 9/21/15, 10:42 AM
This bug just happens to have been brought up in a security context, but if other text edit fields elsewhere in the OS and apps will cause crashes too when fed long strings, that's not just a security issue.
by jefffoster on 9/21/15, 10:05 AM
Writing lock screens is hard!
by nisdec on 9/21/15, 8:44 AM
1. Only affects stock Android 2. Only works with password protection (PIN, pattern = OK) 3. Already patched
by jkrippy on 9/21/15, 12:31 PM
by 2III7 on 9/21/15, 8:38 AM
by mahouse on 9/21/15, 9:27 AM
by PythonicAlpha on 9/21/15, 10:11 AM
Of course, deactivating copy&paste would not be a valid solution for this, but the paste feature also could potentially leak user data to unauthorized persons. The copy feature could by accident reveal the password at places where they do not belong.
by hawleyal on 9/21/15, 2:36 PM
by snowy on 9/21/15, 9:59 AM
The lock screen only accepts a password of 16 digits long.
So.... Only some devices effected?
EDIT:
On further research its fixed on 5.1.1.
Kind of a stupid fix? Just limiting the size on the input password field?
Also I notice that you can no longer copy paste from the emergency call screen.
by ccvannorman on 9/21/15, 1:23 PM
The year is 2015. The basic security of basic devices remains more fucked than ever.
by dsmithatx on 9/21/15, 12:48 PM
Maybe it's because I use the finger print reader and password is for emergency. On my phone this hack seems virtually impossible after 10 minutes of trying really hard to get it to work.
by sharmadwivid on 9/21/15, 7:51 AM