nickq
07-12-2001, 00:50
Non so se la notizia sia degna di fondamento ma avendola trovata la condivido con voi ( anche se il forum non parla di cellulari):
http://www.theregister.co.uk/content/55/23080.html
http://www.theregister.co.uk/content/55/23232.html
How to crash a phone by SMS
By John Leyden
Posted: 28/11/2001 at 18:20 GMT
So now you can send an SMS and crash a mobile phone, so that the user is locked out.
Job de Haas, a security researcher at ITSX, has adapted a program called sms_client, which sends an SMS message from an Internet-connected PC, in which the User Data Header is broken.
During a presentation during the Black Hat conference last week, he demonstrated how a malformed message crashes a Nokia 6210 phone on its receipt. Once the message is received it is impossible to turn on an infected phone again.
The vulnerability is tied to the software used by a phone. The flaw affects Nokia 6210, 3310 and 3330 phones, de Haas has discovered, but not a Siemens phone he tried. Phones from other manufacturers are yet to be tested.
To fix the problem users have to put a SIM card into a phone without the bug. Alternatively if the SMS message is registered in a user's In-box this could be deleted with a SMS management tool on a PC.
To repeat the exploit requires knowledge of SS7 signalling and telco protocols to adapt sms_client into an attack tool. But given the power of the attack security through obscurity doesn't appeal. The kicker is that the modified sms_client makes it trivial to spoof the source of any attack.
Nokia told us that sending a message which freezes a phone is "something it encountered" before. The company is unfamiliar with the exploit uncovered by ITSX, which comes as a new twist even to clued-up Black Hat attendees. It promises to get us a more detailed technical response, and we'll update you when this becomes available. ®
SMS phone crash exploit a risk for older Nokias
By John Leyden
Posted: 06/12/2001 at 14:34 GMT
Nokia has upgraded its phone software to guard against a security glitch that might allow a cracker to render a phone inoperable by sending a text message. However, older phones may still be vulnerable.
Job de Haas, a researcher at security firm ITSX, gave a presentation during a recent Black Hat conference, where he demonstrated how a malformed message crashes a Nokia 6210 phone on its receipt. He did this by adapting a program called sms_client, which sends an SMS message from an Internet-connected PC, in which the User Data Header is broken.
Once the message is received it is impossible to turn on an infected phone again without somehow deleting the offending message.
The vulnerability is tied to the software used by a phone. The flaw affects Nokia 6210, 3310 and 3330 phones, de Haas has discovered, but not a Siemens phone he tried.
Nokia spokesman Pekka Isosomppi told us that the phone manufacturer implemented a fix for the problem after de Haas contacted them about it in August.
He declined to be specific about the nature of the bug but said Nokia has "made the correction and implemented it in our phone programmes, meaning that phones rolling out of the factory have a fix in them."
de Haas said that although phones produced since this summer are immune, older phones might still be vulnerable to the exploit. He has determined the bug to be fixed in release 5.27 for the 6210. Upgrading phone software to guard against the flaw can't be done by users themselves, and would require a trip to a Nokia service centre.
Nokia told us that its users will not have come across the exploit and said the "snag is theoretical" but de Haas disagrees with this low impact assessment.
de Haas said: "Once you figure it out it is quite trivial and there are plenty of people with the knowledge to pull it off. Further we have already determined that there are more problems in the phones even as recent as v5.27."
A network development engineer at a European mobile operator, who asked to remain anonymous, has been in touch to tell us that it first encountered this security issue around 18 months ago. He found the vulnerability to be very much dependent on the version of software used on a Nokia phone, and remembers seeing the security flaw (which he blames on sloppy coding) on the handsets of other manufacturers. ®
http://www.theregister.co.uk/content/55/23080.html
http://www.theregister.co.uk/content/55/23232.html
How to crash a phone by SMS
By John Leyden
Posted: 28/11/2001 at 18:20 GMT
So now you can send an SMS and crash a mobile phone, so that the user is locked out.
Job de Haas, a security researcher at ITSX, has adapted a program called sms_client, which sends an SMS message from an Internet-connected PC, in which the User Data Header is broken.
During a presentation during the Black Hat conference last week, he demonstrated how a malformed message crashes a Nokia 6210 phone on its receipt. Once the message is received it is impossible to turn on an infected phone again.
The vulnerability is tied to the software used by a phone. The flaw affects Nokia 6210, 3310 and 3330 phones, de Haas has discovered, but not a Siemens phone he tried. Phones from other manufacturers are yet to be tested.
To fix the problem users have to put a SIM card into a phone without the bug. Alternatively if the SMS message is registered in a user's In-box this could be deleted with a SMS management tool on a PC.
To repeat the exploit requires knowledge of SS7 signalling and telco protocols to adapt sms_client into an attack tool. But given the power of the attack security through obscurity doesn't appeal. The kicker is that the modified sms_client makes it trivial to spoof the source of any attack.
Nokia told us that sending a message which freezes a phone is "something it encountered" before. The company is unfamiliar with the exploit uncovered by ITSX, which comes as a new twist even to clued-up Black Hat attendees. It promises to get us a more detailed technical response, and we'll update you when this becomes available. ®
SMS phone crash exploit a risk for older Nokias
By John Leyden
Posted: 06/12/2001 at 14:34 GMT
Nokia has upgraded its phone software to guard against a security glitch that might allow a cracker to render a phone inoperable by sending a text message. However, older phones may still be vulnerable.
Job de Haas, a researcher at security firm ITSX, gave a presentation during a recent Black Hat conference, where he demonstrated how a malformed message crashes a Nokia 6210 phone on its receipt. He did this by adapting a program called sms_client, which sends an SMS message from an Internet-connected PC, in which the User Data Header is broken.
Once the message is received it is impossible to turn on an infected phone again without somehow deleting the offending message.
The vulnerability is tied to the software used by a phone. The flaw affects Nokia 6210, 3310 and 3330 phones, de Haas has discovered, but not a Siemens phone he tried.
Nokia spokesman Pekka Isosomppi told us that the phone manufacturer implemented a fix for the problem after de Haas contacted them about it in August.
He declined to be specific about the nature of the bug but said Nokia has "made the correction and implemented it in our phone programmes, meaning that phones rolling out of the factory have a fix in them."
de Haas said that although phones produced since this summer are immune, older phones might still be vulnerable to the exploit. He has determined the bug to be fixed in release 5.27 for the 6210. Upgrading phone software to guard against the flaw can't be done by users themselves, and would require a trip to a Nokia service centre.
Nokia told us that its users will not have come across the exploit and said the "snag is theoretical" but de Haas disagrees with this low impact assessment.
de Haas said: "Once you figure it out it is quite trivial and there are plenty of people with the knowledge to pull it off. Further we have already determined that there are more problems in the phones even as recent as v5.27."
A network development engineer at a European mobile operator, who asked to remain anonymous, has been in touch to tell us that it first encountered this security issue around 18 months ago. He found the vulnerability to be very much dependent on the version of software used on a Nokia phone, and remembers seeing the security flaw (which he blames on sloppy coding) on the handsets of other manufacturers. ®