Dutch IT company finds dos vulnerability Nexus smartphones




The Dutch IT company Levi9 has found a vulnerability in Google Nexus devices that allows attackers to remotely reboot to SMS messages smartphones or to lose. Their connection

The attack works with so-called class 0 or flash SMS text messages and take the Google Galaxy Nexus, Nexus Nexus 4 and 5, regardless of which version of Android 4.x they run. The method was discovered by Bogdan Alecu of IT business Levi9 from Amsterdam. He presented the vulnerability DefCam event in Bucharest, Romania, writes PC World.

Class 0 messages appear according to the GSM specifications directly on the screen of the user, without being stored directly on the phone. At Google Nexus sets the message appears on top of all open windows, leaving the rest of the screen is dimmed. If a user does not view the message, and each received new class 0 messages windows piling up which also increases the dimming effect.

Alecu discovered that the Nexus devices behave when they receive about 30 flash text messages without the user reacts strangely. The probability that the user does not notice is great as there is no audio notification following receipt. The aircraft would usually reboot, but in some cases it would also be lost the connection. The connection to the GSM network would be restored automatically after a while, but for Internet access, the device would have to be restarted. A demonstration also responded a Nexus device at all anymore.

The IT administrator could be the problem encountered, a year ago, but Google did not adequately respond to his messages. Google would have told you that vulnerability in Android 4.3 would be solved, but that was not the case. With smart phones from other manufacturers, the method would have no effect.



In: Technology & Gadgets Asked By: [15500 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »