lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAJVRA1QeKJ6v9BJ3kMjSSkJr09yB0-rBRXi+8CSdnEmLcvXPJw@mail.gmail.com> Date: Sat, 4 Jan 2014 22:28:38 -0800 From: coderman <coderman@...il.com> To: Bernhard Kuemel <bernhard@...ys.at> Cc: Full Disclosure <full-disclosure@...ts.grok.org.uk> Subject: Re: "the Fairphone is fatally flawed for security" On Sat, Jan 4, 2014 at 6:55 PM, Bernhard Kuemel <bernhard@...ys.at> wrote: > "... the modem is ... poorly ... > isolated from the rest of the platform and could access critical > components such as storage, RAM, GPS and audio (microphone) of the > device" > > Can you tell me what attack vectors might exploit this vulnerability? baseband attack (remote injection, carrier cooperation, other vector) leads to -> bus access leads to -> storage, RAM, GPS and audio, etc. baseband vulnerabilities are difficult to identify and weaponize, but growing ever more pervasive. see also these QUANTUMINSERTs: "30C3 Baseband Exploitation in 2013" http://www.youtube.com/watch?v=_5DqsPCCtiI _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists