Reply
Thread Tools
HtheB's Avatar
Moderator | Posts: 3,715 | Thanked: 7,419 times | Joined on Dec 2009 @ Bize Her Yer Trabzon
#1
https://blog.lookout.com/blog/2016/0...ility-android/

Linux flaw that allows anyone to hijack Internet traffic also affects 80% of Android devices

Probably Jolla C too with Dalvik installed?

Edit: Jolla C and Tablet seems to be also vulnerable
__________________
www.HtheB.com
Please donate if you think I'm doing a good job.

Last edited by HtheB; 2016-08-16 at 10:58.
 

The Following 3 Users Say Thank You to HtheB For This Useful Post:
pichlo's Avatar
Posts: 6,445 | Thanked: 20,981 times | Joined on Sep 2012 @ UK
#2
It is my understanding that the vulnerability is in the kernel. IOW, it does not make a difference whether AD is used or not.

What kernel version does JC use? J1 has 3.4, too old and thus safe.
__________________
Русский военный корабль, иди нахуй!
 

The Following 3 Users Say Thank You to pichlo For This Useful Post:
HtheB's Avatar
Moderator | Posts: 3,715 | Thanked: 7,419 times | Joined on Dec 2009 @ Bize Her Yer Trabzon
#3
Originally Posted by pichlo View Post
It is my understanding that the vulnerability is in the kernel. IOW, it does not make a difference whether AD is used or not.

What kernel version does JC use? J1 has 3.4, too old and thus safe.
I think that Jolla C was using at least 3.6
So it might be vulnerable as well
__________________
www.HtheB.com
Please donate if you think I'm doing a good job.
 

The Following 2 Users Say Thank You to HtheB For This Useful Post:
Posts: 233 | Thanked: 532 times | Joined on Sep 2011
#4
Jolla C kernel is 3.10.49
 

The Following 3 Users Say Thank You to pagis For This Useful Post:
HtheB's Avatar
Moderator | Posts: 3,715 | Thanked: 7,419 times | Joined on Dec 2009 @ Bize Her Yer Trabzon
#5
Originally Posted by pagis View Post
Jolla C kernel is 3.10.49
In other words: it's vulnerable
__________________
www.HtheB.com
Please donate if you think I'm doing a good job.
 

The Following 3 Users Say Thank You to HtheB For This Useful Post:
Community Council | Posts: 4,920 | Thanked: 12,867 times | Joined on May 2012 @ Southerrn Finland
#6
No a very serious flaw.

TCP connection hijacking can only ever be used against unencrypted connections so for example ssl/ssh connections are safe provided you don't override certificates
 

The Following 4 Users Say Thank You to juiceme For This Useful Post:
Posts: 1,288 | Thanked: 4,316 times | Joined on Oct 2014
#7
Originally Posted by juiceme View Post
No a very serious flaw.

TCP connection hijacking can only ever be used against unencrypted connections so for example ssl/ssh connections are safe provided you don't override certificates
Not exactly so, this attack, while not 'easy' still, does enables attacking (downgrading) SSL connections.
It has been possible for some years, by MiTM attacks, the situation now however is it is no longer needed to be on the same network (MiTM), you do however, need to know IP adress of both targets. (Victim and server).
 

The Following 7 Users Say Thank You to nieldk For This Useful Post:
Posts: 1,746 | Thanked: 1,832 times | Joined on Dec 2010
#8
does anyone ever exploit these flaws and make serious money off them?
 

The Following User Says Thank You to m4r0v3r For This Useful Post:
Guest | Posts: n/a | Thanked: 0 times | Joined on
#9
Originally Posted by m4r0v3r View Post
does anyone ever exploit these flaws and make serious money off them?
Besides the NSA?
 

The Following 4 Users Say Thank You to For This Useful Post:
pichlo's Avatar
Posts: 6,445 | Thanked: 20,981 times | Joined on Sep 2012 @ UK
#10
NSA et al do not need this exploit to read your emails and eavesdrop on your browsing. They can simply request the data from your ISP. In the worst case they can use the backdoors in encryption algorithms.
__________________
Русский военный корабль, иди нахуй!
 

The Following 3 Users Say Thank You to pichlo For This Useful Post:
Reply

Thread Tools

 
Forum Jump


All times are GMT. The time now is 20:45.