The post above your post links to source about major security issues affecting all Android devices.
http://blog.duosecurity.com/2011/09/android-vulnerabilities-and-source-barcelona/
My mistake then.
The post above your post links to source about major security issues affecting all Android devices.
http://blog.duosecurity.com/2011/09/android-vulnerabilities-and-source-barcelona/
The post above your post links to source about major security issues affecting all Android devices.
http://blog.duosecurity.com/2011/09/android-vulnerabilities-and-source-barcelona/
I have learned to take a lot of those things with a Massive and I mean a massive dose of salt. Most of it is complete FUD. Yes some is relevant but it mostly FUD.
Common sense solves 99% of the problems no matter the OS.
So the first bug is a permission escalation vulnerability that affects all Android handsets in the world. This permission escalation allows an attacker to install additional arbitrary applications with arbitrary permissions without prompting the user to approve those permissions. [...] An attacker can exploit this vulnerability to gain additional privileges after gaining code execution on the device. Its important to note that this attack can also be performed by compromising an existing application.
This isn't the case with this vulnerability.
It is a local privilege escalation with easy vectors to exploit remotely.
Read it again. It requires an someone installing malware of some type to pull that off. It still requires going threw the biggest security hole (the user). Only difference is that it is a little easier to hide it and not make it as blaring to do it.
So the first bug is a permission escalation vulnerability that affects all Android handsets in the world. This permission escalation allows an attacker to install additional arbitrary applications with arbitrary permissions without prompting the user to approve those permissions. [...] An attacker can exploit this vulnerability to gain additional privileges after gaining code execution on the device. It’s important to note that this attack can also be performed by compromising an existing application.
No it doesn't.
Gaining code execution on the device can include remote arbitrary code execution in a existing application on the device.
http://blog.duosecurity.com/2011/09/android-vulnerabilities-and-source-barcelona/
It can not be done with out the user installing it.
An attacker can exploit this vulnerability to gain additional privileges after gaining code execution on the device. Its important to note that this attack can also be performed by compromising an existing application.
You're incorrect.
The quote I provided is from the transcript of the video provided in the following link.
http://blog.duosecurity.com/2011/09/android-vulnerabilities-and-source-barcelona/
Using remote arbitrary code execution would allow the attacker to leverage the exploit without the user installing anything.
which again requires running the code. That is the key part. How are you going to run that code remotely? You need to get the code on said device which is going to require the user running it.
Samsung and AT&T are investigating a permanent solution. In the meantime, owners of the Galaxy S II can remedy the situation by re-setting their time-out screen to the "immediately" setting. This is done by going to the Settings->Location and Security->Screen unlock settings->Timeout->Immediately.
Security firm Sophos discovered and Mashablehas confirmed that you can make calls (and more) with the voice activation service Siri, even when the Apple iPhone 4S is locked.
It could be an obvious security misstep for the Cupertino tech giant, or its in fact an intended feature. In any case, this news will likely do little to slow the momentum of the iPhone 4S, which sold 4 million units in its first weekend available.
If you have an iPhone 4S, testing the security glitch is easy. Set up a passcode, which youll find under Settings/General/Passcode Lock. Enter your new passcode (twice) and then lock your iPhone 4S by pressing the power button once. Normally, to access your phone you would hit the home or power button, swipe the unlock arrow and then enter your four-digit passcode. In this case, tap the home button once, then hold it down to activate Siri. Alternately, you can simply hold down the home button and Siri will come to life asking What can I help you with? Simply say Call . Siri will immediately access the phones contact database and present you with dialing options. We dialed a number and completed a call with no issue.
Now, its important to note you can receive calls on both the iPhone 4 or iPhone 4S without unlocking the phone, so at least half this functionality is intended. On the other hand, this means anyone who finds your phone can access your contacts and perhaps look up phone numbers of your friends, family and business associates. Siri will perform a variety of functions without unlocking the phone, including searching for local businesses, and searching for and playing music on your phone. She wont, however, search the web. When we tried to perform a web search, Siri told us, I cant search the web while your phone is locked. Youll need to unlock it first.
It seems it was intentional judging by what others are saying as apple does offer the option to disable voice control when locked in settings but by default it is on...
I can understand why you have this level of access to a locked iPhone via voice control but but when you set up a pin, you should be warned that Siri still lets people access many features, bypassing some security.
Android has a much bigger security issue than the one presented by the OP.
This flaw affects all Android devices.
So what ? Why does this conversation need to be tainted with slurs and attacks and airs of superiority ?
And iOS has had its share of PDF exploits that permitted jailbreaking (and could have been used for much worse) straight from Safari by visiting a website.
So what ? Why does this conversation need to be tainted with slurs and attacks and airs of superiority ?
It looks like Samsung copied nearly everything from Apple's iPhone... except the ability to secure your phone!
http://www.bgr.com/2011/09/30/major-security-flaw-lets-anyone-bypass-att-samsung-galaxy-s-ii-security-video/
Read the original post in this thread:
A thread's focus or topic has to change (within reason) for it to evolve and live on and for it to become and interesting discussion. I dunno about you, but I think this focus change is just within reason.The focus of this thread is Android vulnerabilities so I posted about Android vulnerabilities.
The original post was tainted with the same. iOS is no better than Android in this regard, no matter how much the OP wants it to be.
I don't believe this is true for several reasons:
1) The Linux kernel is known to contain more privilege escalation vulnerabilities than the kernel used in iOS.
iOS (2010-11) = 3 -> http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=apple+iOS+gain+privileges
Linux (2010-2011) = 26 -> http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=linux+kernel+gain+privileges
The agp_generic_remove_memory function in drivers/char/agp/generic.c
You've just searched for all vulnerabilities in Linux, a very versatile and generic OS that supports so many hardware configurations dating back to pre-historic times in the computer industry that it can run on everything from TVs to micro-controllers to desktop computers to full NUMA enabled supercomputing nodes.
And then you compare that to iOS, a very small subset of a very niche OS kernel that runs on either PCs branded as Macs or portable devices.
And you deem that a fair comparison? Of course the Linux kernel is going to have more vulnerabilities, it supports hundreds more sub-systems and drivers. There's just more code there. Now answer this :
How many of those Linux vulnerabilities can be used to exploit an Android based smartphone? All 3 of those iOS vulnerabilities can be used.
And again : jailbreakme.com. It only takes 1 nasty vulnerability to do it. Numbers don't matter if that 1 you have is highly exploitable.