Security News > 2011 > May > Google Silently Patches Android Authentication Flaw

http://www.eweek.com/c/a/Security/Google-Silently-Patches-Android-Authentication-Flaw-837349/ By Fahmida Y. Rashid eWEEK.com 2011-05-19 Google is implementing a server-side fix to address the authentication flaw that allows third-parties to access Android user data on Google Calendar, Contacts and Picasa. Google is planning to fix a security issue that could potentially allow hackers and cyber-crooks to access the personal information of people who use the companyâs Android mobile operating system. Google plans to push out the fix within the next week. Researchers at Germanyâs University of Ulm originally found the vulnerability and published their findings on May 13. The flaw only impacts Android applications that authenticate with Google services, such as Calendar and Contacts. If the user opens a WiFi network and tries to access those services, a hacker could potentially intercept the authentication token and use it to log in to the user account for up to two weeks. "Today we're starting to roll out a fix which addresses a potential security flaw that could, under certain circumstances, allow a third-party access to data available in Calendar and Contacts," a Google spokesman told eWEEK on May 18. [...]
News URL
http://www.eweek.com/c/a/Security/Google-Silently-Patches-Android-Authentication-Flaw-837349/
Related news
- Google fixes Android zero-days exploited in attacks, 60 other flaws (source)
- Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities (source)
- Google adds Android auto-reboot to block forensic data extractions (source)
- Update ASAP: Google Fixes Android Flaw (CVE-2025-27363) Exploited by Attackers (source)
- Google fixes actively exploited FreeType flaw on Android (source)
- Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android (source)
- Google’s Advanced Protection Now on Android (source)
- Google strengthens secure enterprise access from BYOD Android devices (source)