NZGames.com Forums
Register FAQ Calendar Mark Forums Read

Go Back   NZGames.com Forums > General > Technology & Troubleshooting
User Name
Password

Reply
 
Thread Tools
Old 26th September 2012, 13:19     #11641
sky_
 
What a horrible, nasty bug. Tested on Jellybean, not vulnerable as said above.

http://dylanreeve.posterous.com/remote-ussd-attack


Install TelStop, which adds a handler for the "tel:" URI. If that URI is used, android will prompt what app to use (which in itself is pretty good).

Or install a new dialler like Dialler One (not vulnerable to this).

Test link to show imei: tel:*%2306%23
Dialler will always launch. If you're vulnerable, you'll see your imei though.

Last edited by sky_ : 26th September 2012 at 13:22.
  Reply With Quote
Old 26th September 2012, 13:22     #11642
TnT
 
So basically the fix is either have Jellybean or install a different dialler? I'm not sure why I care anymore.
  Reply With Quote
Old 26th September 2012, 13:26     #11643
Spink
 
Quote:
Originally Posted by p01s0n
um android is the OS for that demographic where 'poors' overlaps with 'idiots'
I can confirm this is true, I saw an infographic about it.
__________________
Weak hearts I rip.
  Reply With Quote
Old 26th September 2012, 13:30     #11644
p01s0n
 
Quote:
Originally Posted by sky_
What a horrible, nasty bug. Tested on Jellybean, not vulnerable as said above.

http://dylanreeve.posterous.com/remote-ussd-attack


Install TelStop, which adds a handler for the "tel:" URI. If that URI is used, android will prompt what app to use (which in itself is pretty good).

Or install a new dialler like Dialler One (not vulnerable to this).

Test link to show imei: tel:*%2306%23
Dialler will always launch. If you're vulnerable, you'll see your imei though.
what about this loller?
https://github.com/timrogers/rack-galaxy-s3-exploit
Quote:
rack-galaxy-s3-exploit is a Rack middleware which adds the code on every page to activate an exploit for (at least some) Samsung Galaxy S3 devices (and perhaps others) which causes them to be returned to factory settings.
__________________
||hellameke.com Image host of NZG pro's||Tu meke Tu much||
  Reply With Quote
Old 26th September 2012, 13:35     #11645
sky_
 
Quote:
Originally Posted by p01s0n
What about it?
  Reply With Quote
Old 26th September 2012, 13:36     #11646
sky_
 
Quote:
Originally Posted by TnT
So basically the fix is either have Jellybean or install a different dialler? I'm not sure why I care anymore.
Oh fuck yeah. It's damn horrible.
  Reply With Quote
Old 26th September 2012, 13:38     #11647
p01s0n
 
Quote:
Originally Posted by sky_
What about it?
can you pls confirm/deny that it is in fact as hilarious as it sounds on paper?
__________________
||hellameke.com Image host of NZG pro's||Tu meke Tu much||
  Reply With Quote
Old 26th September 2012, 13:47     #11648
sky_
 
I don't understand? It's just a very silly way to do the attack?
  Reply With Quote
Old 26th September 2012, 13:48     #11649
p01s0n
 
you used to be cool
__________________
||hellameke.com Image host of NZG pro's||Tu meke Tu much||
  Reply With Quote
Old 26th September 2012, 14:11     #11650
sidbo
Raptus regaliter
 
Quote:
Originally Posted by sky_
What a horrible, nasty bug. Tested on Jellybean, not vulnerable as said above.

http://dylanreeve.posterous.com/remote-ussd-attack


Install TelStop, which adds a handler for the "tel:" URI. If that URI is used, android will prompt what app to use (which in itself is pretty good).

Or install a new dialler like Dialler One (not vulnerable to this).

Test link to show imei: tel:*%2306%23
Dialler will always launch. If you're vulnerable, you'll see your imei though.
I just emailed this to myself, and clicked the link on my phone (HTC One X) and it displayed the IMEI... that means that this is not just Samsung specific? Or is it the USSD code that's specific to the S3 devices?

[fake edit] never mind, the link above confirms the HTC is also vulnerable, joy.

Last edited by sidbo : 26th September 2012 at 14:14.
  Reply With Quote
Old 26th September 2012, 14:12     #11651
sky_
 
Awww, sorry =)
  Reply With Quote
Old 26th September 2012, 14:13     #11652
sky_
 
Quote:
Originally Posted by sidbo
I just emailed this to myself, and clicked the link on my phone (HTC One X) and it displayed the IMEI... that means that this is not just Samsung specific?
Sorry, should have mentioned - this ain't samsung specific. Many, many android devices will be vulnerable to this. It's all about dodgy dialler app code. If it accepts USSD codes from a remote source, it's screwed. Seen another HTC which we think is vulnerable too..

Also note: the workarounds work for remote exploitation via tel: - but it can be triggered via emergency dialler. That's fixed in JellyBean too...

Bring up emergency dialler and put in the code to trigger imei. If it pops up, don't leave you phone near drunken geeks.

Last edited by sky_ : 26th September 2012 at 14:18.
  Reply With Quote
Old 26th September 2012, 14:26     #11653
sky_
 
Sidbo - does this link trigger it too?
http://dylanreeve.com/phone.php
  Reply With Quote
Old 26th September 2012, 14:59     #11654
sky_
 
Edit: nm
  Reply With Quote
Old 26th September 2012, 15:02     #11655
BaM
Freeloader
 
  Reply With Quote
Old 26th September 2012, 15:04     #11656
sidbo
Raptus regaliter
 
Quote:
Originally Posted by sky_
Sidbo - does this link trigger it too?
http://dylanreeve.com/phone.php
Yep. Popped up the IMEI (once I told it to use the standard dialer to action the link).
  Reply With Quote
Old 26th September 2012, 15:16     #11657
sky_
 
Ah bugger.

BaM: fucking love it =)
  Reply With Quote
Old 26th September 2012, 15:23     #11658
Savage
 
(BaM) ^ awesome

Must resist urge to post that on Facebook

Last edited by Savage : 26th September 2012 at 15:26.
  Reply With Quote
Old 26th September 2012, 15:29     #11659
blur^
 
if you run chrome you are safe, the TEL uri is not handled by chrome
  Reply With Quote
Old 26th September 2012, 15:31     #11660
Cyberbob
 
Quote:
Originally Posted by Savage
Must resist urge to post that on Facebook
Done. awaiting replies.
__________________
ɹǝʌo sᴉ ǝɯɐƃ ʎɥʇ
  Reply With Quote
Old 26th September 2012, 15:35     #11661
sky_
 
Quote:
Originally Posted by blur^
if you run chrome you are safe, the TEL uri is not handled by chrome
Firefox supports it =/

You can trigger it via other means including SMS (WAP PUSH message), QR code (as nicely demonstrated above), NFC... bleh...
  Reply With Quote
Old 26th September 2012, 15:38     #11662
blur^
 
yeah it looks like it depends on your phone/dialer
my s3 w/ chrome seems to be ok, have tried a bunch of the test sites in the xda thread
  Reply With Quote
Old 26th September 2012, 16:04     #11663
blur^
 
if your phone is rooted you can remove keystring*.apk from system/app/
will stop the codes from executing but then you cant use any other codes
  Reply With Quote
Old 26th September 2012, 16:20     #11664
Ab
A mariachi ogre snorkel
 
Jesus what a clusterfuck.
  Reply With Quote
Old 26th September 2012, 16:32     #11665
blur^
 
the guy who found the vulnerability apparently told samsung 3 months ago
so 4.0.4 ont he s3 appears to have been patched

didnt tell anyone else though. gg
  Reply With Quote
Old 26th September 2012, 16:35     #11666
Cyberbob
 
<AndroidVersionsInTheWildPieGraph.jpg>
__________________
ɹǝʌo sᴉ ǝɯɐƃ ʎɥʇ
  Reply With Quote
Old 26th September 2012, 16:40     #11667
blur^
 
a lot of the blame is with the user

if you are going to use an old unpatched operating system on the tubes
you are going to have a bad time
  Reply With Quote
Old 26th September 2012, 16:42     #11668
p01s0n
 
Quote:
Originally Posted by blur^
a lot of the blame is with the user

if you are going to use an old unpatched operating system on the tubes
you are going to have a bad time
this is priceless
__________________
||hellameke.com Image host of NZG pro's||Tu meke Tu much||
  Reply With Quote
Old 26th September 2012, 16:42     #11669
Trigger
Laserman
 
hey guys don't forget about BlackBerry

here is a song
http://www.youtube.com/watch?v=WlsahuZ_4oM
__________________
Are you slow? The alleged lie that you might have heard, me saying, allagedly moments ago... That's a parasite that lives in my neck.
  Reply With Quote
Old 26th September 2012, 16:43     #11670
Rince
SLUTS!!!!!!!
 
Quote:
Originally Posted by sky_
What a horrible, nasty bug. Tested on Jellybean, not vulnerable as said above.

http://dylanreeve.posterous.com/remote-ussd-attack


Install TelStop, which adds a handler for the "tel:" URI. If that URI is used, android will prompt what app to use (which in itself is pretty good).

Or install a new dialler like Dialler One (not vulnerable to this).

Test link to show imei: tel:*%2306%23
Dialler will always launch. If you're vulnerable, you'll see your imei though.
First time I clicked on it, just got the dialer, second time for the imei. Fuck
__________________
Slow internet is worse than no internet. It's like putting your penis in once and then being required to make out for 2 hours
--Matt "The Oatmeal" Inman
  Reply With Quote
Old 26th September 2012, 16:45     #11671
Ab
A mariachi ogre snorkel
 
Right, off to kinkos to print a few thousand QR code stickers and go wild, brb
  Reply With Quote
Old 26th September 2012, 16:46     #11672
blur^
 
Quote:
Originally Posted by p01s0n
this is priceless
because im a droid user and i admit there are idiots out there that use droids?

i like taking snipes at apple as much as anyone, but the world is full of stupid people regardless of what brand they buy
  Reply With Quote
Old 26th September 2012, 16:48     #11673
Rince
SLUTS!!!!!!!
 
Telstop seems to stop it. Thanks
__________________
Slow internet is worse than no internet. It's like putting your penis in once and then being required to make out for 2 hours
--Matt "The Oatmeal" Inman
  Reply With Quote
Old 26th September 2012, 16:48     #11674
p01s0n
 
Quote:
Originally Posted by blur^
because im a droid user and i admit there are idiots out there that use droids?
this is a pretty redundant statement because the chart clearly shows that only idiots use droids
__________________
||hellameke.com Image host of NZG pro's||Tu meke Tu much||
  Reply With Quote
Old 26th September 2012, 16:49     #11675
Cyberbob
 
Geniune question from a non droid user: Is every affected device eligible for a 4.0.4 upgrade? Or are some screwed.
__________________
ɹǝʌo sᴉ ǝɯɐƃ ʎɥʇ
  Reply With Quote
Old 26th September 2012, 16:50     #11676
Saladin
Nothing to See Here!
 
Quote:
Originally Posted by p01s0n
only idiots use droids
In before someone mentions the Woz.
  Reply With Quote
Old 26th September 2012, 16:52     #11677
blur^
 
Quote:
Originally Posted by p01s0n
this is a pretty redundant statement because the chart clearly shows that only idiots use droids
you are a redundant statement



Quote:
Originally Posted by Cyberbob
Geniune question from a non droid user: Is every affected device eligible for a 4.0.4 upgrade? Or are some screwed.
pretty sure everyone can get it, if not directly from their maker they can flash it themselves

Last edited by blur^ : 26th September 2012 at 16:53.
  Reply With Quote
Old 26th September 2012, 16:57     #11678
BaM
Freeloader
 
Cool, because everyone is going to know or care enough to do that.

End result: there are going to be a fuckload of pissed off Android users out there.
  Reply With Quote
Old 26th September 2012, 16:59     #11679
Saladin
Nothing to See Here!
 
Quote:
Originally Posted by blur^
pretty sure everyone can get it, if not directly from their maker they can flash it themselves
Let's pick a random droid phone.. Huawei Ideos X5 - was promoted fairly heavily on 2degrees last year.

Right, let's see if you can flash one to JB.

http://forum.xda-developers.com/show....php?t=1742757

Quote:
What Works:

ADB
Touchscreen(thanks dzo)
Hardware Acceleration
Notification LED
SMS
Accelerometer
Charging
Maybe More


What Doesn't work:

Wi-Fi/Bluetooth
Audio
Camera
MTP
Storage
Maybe more
Oh.
  Reply With Quote
Old 26th September 2012, 17:00     #11680
p01s0n
 
Quote:
Originally Posted by Saladin
In before someone mentions the Woz.
woz is a huge idiot lol, he's like king of the idiots.
__________________
||hellameke.com Image host of NZG pro's||Tu meke Tu much||
  Reply With Quote
Reply


Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump



© Copyright NZGames.com 1996-2024
Site paid for by members (love you guys)