0 Replies - 5771 Views - Last Post: 01 January 2014 - 02:38 PM

#1 macosxnerd101  Icon User is online

  • Self-Trained Economist
  • member icon




Reputation: 10595
  • View blog
  • Posts: 39,246
  • Joined: 27-December 08

[Link] Update Vulnerability In Third Party SDK For Android Platform

Post icon  Posted 01 January 2014 - 02:38 PM

For those who make money off advertising in their Android apps:

Quote

The framework is called HomeBase SDK (software development kit) and is developed by Widdit, based in Ramat Gan, Israel. It allows Android developers to monetize their apps by displaying ads and custom content on the phone's lock screen...

Since the communication with the update server is done via plain HTTP with no SSL encryption, an attacker could intercept the application's request as it travels over an insecure wireless network or a compromised network gateway and serve back a malicious JAR file, according to the Bitdefender researchers.

In addition, the authenticity of the downloaded file is not verified, so the host app has no way of knowing whether the JAR file actually came from Widdit or not, they said.


http://www.javaworld...to-attacks.html

Is This A Good Question/Topic? 0
  • +

Page 1 of 1