Wednesday, November 14, 2012

Risk Mitigation: Open the SMS App And Press Menu -

Android devices at risk - without the user's knowledge can erase data - Christopher Skutelis (krizdabz.lv)
Reviews (45) Mobile Phones (35) HTC One X + Reviews Nokia Asha 311 Reviews samsung s5230 HTC One X Review LG Optimus 4X HD Review Samsung Galaxy S III Review Sony Xperia S Review HTC Titan Review Samsung Galaxy Nexus review Samsung Galaxy S II Review Nokia N9 Review HTC Explorer Review Samsung Galaxy Ace Review Other Reviews ... Computers (1) 13 "Apple samsung s5230 MacBook Air (2012th model year) Reviews Other Reviews ... Tablets (5) ASUS Nexus 7 Review ASUS Eee Pad Transformer Prime Review ASUS Eee Pad Transformer Acer Iconia Review

Tab (A500) Review Samsung Galaxy Tab Review Other Reviews ... E-Readers (2) Amazon samsung s5230 Kindle 3 Reviews Pocketbook 301 Review Other Reviews ... TV (2) Apple TV Review Samsung Smart TV Reviews Other Reviews ... Other Gadgets Reviews ... What smartphone to buy? Price U.S. $ to 100 U.S. $ Price from 100 up to $ 200 Designed Latvian What is ...? What is a "gray" phones? What is a QR code? What is NFC? What is SOPA and PIPA? What is HTML5? What is RSS? Radio Technology rubric Star FM broadcast Zoopasta Archives TV I suggest androids.lv windowsphone.lv dubstep.lv bradajumi.lv samsung s5230 Contact The blog and its author-operation opportunities samsung s5230 Subscriptions krizdabz.lv Contact the author Search
Today, the Internet appeared that the (Samsung and other manufacturers) Android devices are at risk. For such a device by sending a USSD code properly prepare the WAP Push message format or receiving / scanned constituted NFC news or QR code, without any user interaction devices can run USSD code nonullē device settings. Properly designing a device settings / data nonullēšanas USSD code (for example, preparing it as HTML code) without the user's knowledge can be reset to zero the device. The vulnerability could also be used for sacrifice by sending a properly samsung s5230 completed NFC message with a link to a site or injurious code by reading the following link from the QR code. The user of the phone is enough to open a web page according to the preparation and the device can be reset to zero.
This problem applies to Android devices manufactured by Samsung that uses the TouchWiz interface. samsung s5230 Information has been confirmed that the problems affecting the Samsung Galaxy samsung s5230 S II, Galaxy S III, Galaxy Beam, Galaxy S, Galaxy S smartphones Advance. This problem is acute in other manufacturers designed samsung s5230 for Android

devices.
Added: Samsung Electronics: "Please be informed that the recent security issue, which hit the Galaxy S III smartphones, users Latvian be solved with a software update. We recommend that all Galaxy S III users to download latest software update, which is quickly and easily done using the Over-The-Air (OTA) service, ie using the Software samsung s5230 Update feature the same phone. '
This vulnerability presented a few days ago held Ekoparty 2012 conference. I recommend the video located below, which constitute the essence of the problem is shown. If everything

in life is so simple and no user interaction, the Android samsung s5230 device manufacturers in the garden to elect milzīgākais same stone as found in - the problem is critical and inexcusable. Hopefully, the Android device manufacturers will be able to fix it quickly and Vandals neuzspēs samsung s5230 reset to zero too many careless user devices.
The SENDERS number is not displayed by the device. The user is Unable to Verify who sent this message and if the link contained processing can be trusted. This leaves samsung s5230 room for Either social engineering, phishing or, if an exploit exists a Compromise of the whole device. samsung s5230 Obviously this kind of sms also Allows Malicious people it sent anonymous messages to Their Victims.
A load message service samsung s5230 can be configured in the way it Should be received by the target device. Among others one option is to force the target device to load the defined content from a URL without interacting with the user. Again the SENDERS number is not displayed by the device. If Forced Such a message is received by the device samsung s5230 it will open the default browser and display Either the URL defined in the message or download the targeted payload from the URL. This can be any filetype, EVEN an APK. In the case of an APC the user gets to asked if he will install samsung s5230 the file. If sideloading is activated in the device settings Provided the file will be installed. If the archive Contains a vulnerability this kind of message can be used to fully Compromise the device.
Risk Mitigation: Open the SMS App And Press Menu -> Settings. Go to the "Push message settings" and Either samsung s5230 disable the service, or if you need it set "Service loading" to "Prompt" or "Never". To test if your devices is Vulnerable You can use HushSMS

for Android to send WAP Push WAP Push SI and SL messages.
At the risk can try to open this website: samsung s5230 http://www.misterjonjon.com/p/samsung-ussdgate-test.html. In a similar manner using the device rather than nonullēšanas USSD code, but the code * # 06

No comments:

Post a Comment