Google
has joined the ranks of companies which have issued public warnings
about their products being vulnerable to exploitation thanks to the
massively widespread Heartbleed bug. The company has now disclosed that
users of all Android versions except specifically 4.1.1 are unaffected.
Buried
at the bottom of a blog post titled Google Services Updated to Address
OpenSSL CVE-2014-0160 (the Heartbleed bug), the search and online
services giant added that 'patching information' for Android 4.1.1 is
being distributed to device manufacturers and carriers, who are
responsible for creating and issuing updates.
Android version
fragmentation is a known problem within the ecosystem, and millions of
users could still be running version 4.1.1, also known by the codename
Jelly Bean. According to Google's own Android developer dashboard, up to
34.4 percent of all Android users are currently running 4.1 - 4.1.2,
though the exact number or percentage of users running 4.1.1 is not
known.
Version 4.1.1 was a minor update to 4.1 containing bug
fixes related to specific devices. Version 4.1.2 was released less than
three months later, potentially limiting the scope of the number of
devices affected. However, Android manufacturers are frequently
criticised for shipping devices built with older Android builds, and not
issuing updates thereafter. A large number of budget devices are never
updated once they are shipped.
Google has further disclosed that
its Web services Search, Gmail, YouTube, Wallet, Play, Apps, App Engine,
AdWords, DoubleClick, Maps, Maps Engine and Earth were affected by
Heartbleed but have now been patched. Other vulnerable websites included
Dropbox, Facebook, Twitter, Tumblr, Yahoo, GoDaddy, and Amazon Web
Services.
By contrast, Apple has stated that iOS, OS X, and its widely used Web services including iTunes and iCloud were never affected.
Heartbleed
is a bug in the OpenSSL encryption framework used by Web servers to
secure communications between themselves and the outside world. In early
April, it was reported that attackers were able to retrieve information
including sensitive encryption keys, user account details and message
contents, from servers running the vulnerable version of OpenSSL.
Security
workers have since demonstrated hacks that have resulted in retrieval
of working encryption keys. It is not knows whether attackers, including
government-sponsored agencies, were aware of the existence of the
Heartbleed bug and were exploiting it before it became widely known.