Google Android Flaw Reopens Open Source Security Debate
A security flaw in Google's new Android operating system discovered recently by independent researchers further underscores the security debate between open source and proprietary software.
On Monday, Charlie Miller, Mark Daniel, and Jake Honoroff of Independent Security Evaluators said they have identified and exploited a security vulnerability in Android. In their findings, they said the first commercial phones using Android -- in this case, T-Mobile's G1 -- are "being shipped with the vulnerability present and may pose a security risk to their users until an update becomes available."
Questions of whether the copyrighted OS is safer, or if this should be considered a setback to Google's expansion into non-search-related products and services, should be answered on a case-by-case basis, said Derek Manky, a security researcher for Fortinet.
"In general, today's threat-scape hosts threats [that] are mostly targeted toward Windows as opposed to Linux," Manky said. "So, in terms of volume and market share of exploits, proprietary OSes would still be at higher risk. Keep in mind that this isn't just the operating system itself. Most threats spawn from the code applications which are hosted on that operating system, i.e., Windows and ActiveX controls."
Manky added that one upside to this discovery is that vulnerabilities in open source OSes may be identified quicker, because available source code makes it easy to search for potential weaknesses.
Google's Second Security False Start?
The researchers who discovered the Android flaw opted not to disclose its details until a fix can be issued. However, they said that a successful exploit could allow an attacker to retrieve all stored information in the victim's browser.
This same sort of controversy morphed into a larger discourse about Google vs. Microsoft -- as well as open source vs. closed source programs -- last month when a flaw was found in Google's much-heralded Chrome browser. In that instance, Chrome, which is partly based on open source software components used in Mozilla's Firefox and Apple's WebKit, had flaws of its own that were remedied by both Firefox and Mozilla.
For its part, Android is based on more than 80 different open source packages. The researchers who discovered the bug said the vulnerability arose from the fact that Google didn't use the most up-to-date versions of all these packages (which admittedly can be difficult, given the nature of real-time development in the open source community). This means that while the Android vulnerability may have been known and even fixed in the software packages that come bundled with the T-Mobile G1 phone, on the back-end Google still deployed an older and still-exposed edition of the OS.
Experts like Fortinet's Manky chalk it up to growing pains for the developers of Google's nascent programs.
"I would say the largest difference here is that we are dealing with a new mobile platform -- the source for Android was only recently revealed -- that is, open source," he said. "What makes this threat unique is that it was 'sought out' based off previous knowledge, since it was a new product using an existing source tree, which you don't have with Windows-based products."
-- Jabulani Leffall