Search WOT

Tuesday, September 17, 2013

Firefox OS for Android Compromised

"Firefox OS anticipates your needs, adapts to every situation and instantly delivers the
information you want.
That includes popular, big name apps, but also local content that means the most to you and your life."
Is the quote on the Firefox OS page.
But it has recently been revealed that the operating system which seeks to compete against the Android and IOS market may be vulnerable to attack, the Firefox OS is built around HTML5, the latest version of the open standard web programming language that is designed to be more interactive and multimedia friendly.

Firefox OS borrows much from the Firefox mobile browser and Gecko application framework, which is used to render Web pages and display applications.
The platform underpinning Firefox OS, called Boot to Gecko (B2G), borrows 95 percent of its code from the mobile browser and Gecko, according to Mozilla.
The mobile OS uses a Linux kernel, which then boots into the Gecko runtime.
The top layer of the technology stack, called Gaia, generates the interface seen by users.
Trend Micro pinpointed what the company believes are avenues for hackers to exploit.
As more people use smartphones, attackers are increasingly looking for ways to exploit mobile devices.

"Though the Firefox OS may not enjoy the market of the Android OS, the use of HTML5 is gradually gaining traction among users (Amazon also accepts HTML5 for its apps)," wrote Peter Pi, a threats analyst for Trend. "Thus, regardless of OS, we can expect that as more apps and sites will use HTML5, we can expect such attacks to increase in the future."
B2G contains a process within the OS that enforces permissions granted to applications and prevents unauthorized requests by those applications, Pi wrote.
Some applications can request more permissions, but those requests must be verified and signed by an application store, Pi wrote. The B2G process has high privileges and vets those requests. Mozilla has acknowledged B2G is a possible attack vector, he wrote.
"If this process is exploited, an attacker can obtain high-level privileges (like root access)," Pi wrote.
A vulnerability found last month, which was actually fixed in the course of repairing a different flaw in June, caused the B2G process to crash. Pi noted it could have allowed an attacker to run arbitrary code on a device with the same high privileges as the B2G process.
 SOURCES: ComputerWorld

No comments:

Post a Comment