Vulnerabilities > CVE-2013-4787 - Cryptographic Issues vulnerability in Google Android
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Android 1.6 Donut through 4.2 Jelly Bean does not properly check cryptographic signatures for applications, which allows attackers to execute arbitrary code via an application package file (APK) that is modified in a way that does not violate the cryptographic signature, probably involving multiple entries in a Zip file with the same name in which one entry is validated but the other entry is installed, aka Android security bug 8219321 and the "Master Key" vulnerability.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Exploit-Db
description | Google Android 'APK' code Remote Security Bypass Vulnerability. CVE-2013-4787. Remote exploit for android platform |
id | EDB-ID:38627 |
last seen | 2016-02-04 |
modified | 2013-07-03 |
published | 2013-07-03 |
reporter | Bluebox Security |
source | https://www.exploit-db.com/download/38627/ |
title | Google Android 'APK' code Remote Security Bypass Vulnerability |
References
- http://bluebox.com/corporate-blog/bluebox-uncovers-android-master-key/
- http://review.cyanogenmod.org/#/c/45251/
- http://www.osvdb.org/94773
- http://www.securityfocus.com/bid/60952
- http://www.zdnet.com/google-releases-fix-to-oems-for-blue-security-android-security-hole-7000017782/
- https://jira.cyanogenmod.org/browse/CYAN-1602
- https://plus.google.com/113331808607528811927/posts/GxDA6111vYy