Researchers at the Open Source Computer Emergency Response Team (oCERT) disclosed two denial-of-service vulnerabilities in Google Inc.'s Android 1.5 mobile phone platform, both of which have already been patched by the vendor.
One of the vulnerabilities stems from Andoid's handling of SMS messages, according to an advisory released by oCERT earlier this week. The flaw allows an attacker to use malformed WAP (wireless application protocol) Push messages to disconnect a mobile phone from a cellular network. WAP Push messages are typically used to send ringtones, wallpapers and other content to mobile users.
According to oCERT, a maliciously crafted WAP message can cause the phone to reboot without the user's knowledge, which can lead to a temporary loss of connectivity and dropped calls. In cases where the phone SIM (subscriber identity module) is protected by a PIN, users will need to re-enter the PIN to reestablish connectivity causing longer delays. When the bug is triggered repeatedly, it could result in a denial of service condition, oCERT said.
A similar vulnerability was discovered in several Sony Ericsson handsets earlier this year where a malformed WAP Push message could be used to remotely reboot a vulnerable handset.
The other DoS vulnerability was reported in the application programming interface for Android's Dalvik virtual machine. It also allows an attacker to create a DOS condition by causing a handset to repeatedly reboot without the user's knowledge.
The advisories were released this week after Google issued patches addressing both problems.
This story, "Google patches DoS vulnerabilities in Android" was originally published by Computerworld.