Samsung Galaxy devices may have a backdoor




Developers of Android alternative claim that many of Samsung Galaxy devices have a backdoor, because the modem software can write. To the phone memory Galaxy S4 and S5 are not vulnerable.

Samsung logo (45 pix) The back door was found by the developers of Replicant, an open source alternative to Android, which is a large part of the Android code base has on board. According to the developers are vulnerable to various devices, including the Galaxy Note 2, Tab 10.1, Galaxy S2 and Galaxy S3. Galaxy S4 and S5 are not affected. The Galaxy S would be most affected, while the backdoor runs at root level. On other phones the exploit running in the user environment, but this example, the SD card can still be read.

The crux lies in the software that controls the communication with the modem. This code includes support for various commands, including input / output operations to the internal memory of the phone. The developers presumption that it is thereby possible to remotely issue commands to a telephone to send, after which access can be gained to the file system.

The developers emphasize that there is no need to be malicious intent, but nevertheless there is a backdoor. “The result is the same, it indicates the modem to access the internal memory,” they write. Moreover, the developers have no practical use for the commandos. Samsung was not available for comment.

Users can install Replicant, as the backdoor does not work. In addition, the Nexus S and Galaxy Nexus support for SELinux, which the movement space for the backdoor is curtailed. Developers of alternative firmware would rfs requests known to block, so that the backdoor is no longer effective in your kernel.


In: Technology & Gadgets Asked By: [15509 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »