Home Discord Chat
Go Back   ChiefsPlanet > Nzoner's Game Room
Register FAQDonate Members List Calendar

 
 
Thread Tools Display Modes
Prev Previous Post   Next Post Next
Old 09-27-2012, 07:42 AM   Topic Starter
pr_capone pr_capone is offline
**** SOC & **** YOU
 
pr_capone's Avatar
 
Join Date: Jan 2006
Location: Chiefs Hell
Casino cash: $10018214
Android security flaw

Figure there are Android phone users out there that don't visit the Media Center that might be affected by this which is why this is in the Lounge. I have added the QR code below that will link you directly to the test site (in case you aren't reading from your mobile).

SCAN:


OR CLICK:
http://www.isk.kth.se/~rbbo/testussd.html

http://www.pcworld.idg.com.au/articl...security_flaw/

Quote:
A security flaw has been discovered on various Android smartphones that allows a USSD code to perform a factory reset without any confirmation prompt. Is your Android phone at risk? Here's how to find out.

The USSD flaw was highlighted overnight at a Security Conference in Buenos Aires, Argentina by Ravi Borganokar, a researcher in the telecommunications department at the Technical University of Berlin. It was first said to occur only on various Samsung smartphones running the TouchWIZ UI overlay, but it has since been discovered that the problem can affect various other Android phones, too.

The USSD codes themselves aren't a problem, but on some Android phones these can be executed without a confirmation prompt. Some of these codes, typed into the phones keypad, are harmless (such as the one used to display a phone's IMEI number) but other codes can factory reset the phone. USSD codes typically start with an asterisk (*) followed by numbers and almost always end with a hash (#).

On Android phones that don't require a confirmation prompt, a factory reset USSD code can be dialled automatically by the phone. While it's almost impossible to dial the code into the dialler accidentally, this code could be embedded into a URL link, a QR code, or an SMS by a hacker. This would mean you phone would be factory reset as soon as you opened the malicious link.

To check if your Android phone is vulnerable, follow these steps:

1. Visit this link through your phone's Web browser. Don't worry, it's a test page so it's not going to reset your phone!

2. If your phone's dialler pops up and shows a number, your phone isn't affected and there's no need to worry. This is shown below on a Sony Xperia go:



However, if your phones dialler pops up and immediately displays a pop up menu with your IMEI number, your phone is vulnerable to this security flaw. This is displayed below on a Samsung Galaxy S III:



To fix this security flaw until your carrier or manufacturer issues a patch for the problem, you can download an app called TelStop. You can find it in the Google Play Store here.
Posts: 19,884
pr_capone is obviously part of the inner Circle.pr_capone is obviously part of the inner Circle.pr_capone is obviously part of the inner Circle.pr_capone is obviously part of the inner Circle.pr_capone is obviously part of the inner Circle.pr_capone is obviously part of the inner Circle.pr_capone is obviously part of the inner Circle.pr_capone is obviously part of the inner Circle.pr_capone is obviously part of the inner Circle.pr_capone is obviously part of the inner Circle.pr_capone is obviously part of the inner Circle.
    Reply With Quote
 


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump




All times are GMT -6. The time now is 09:01 AM.


This is a test for a client's site.
Fort Worth Texas Process Servers
Covering Arlington, Fort Worth, Grand Prairie and surrounding communities.
Tarrant County, Texas and Johnson County, Texas.
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.