More Java Woes
A number of readers alerted us of news reports stating that new "full sandbox escape" vulnerabilities had been reported to Oracle. At this point, there are no details available as to the nature of these vulnerabilities, and there is no evidence that any of these vulnerabilities are exploited. However, it is widely known that Oracle is working on a substantial backlog of these vulnerabilities. It is still recommended to use Java "with caution". Some best practices:
- Uninstall Java if you don't need it.
- if you do need Java, make sure it doesn't start automatically in your web browser.
- keep Java up to date
- reduce the number of Java variants you have installed to the minimum you need.
------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter
Some Android phones can be reset to factory default by clicking on links
Many mobile browsers do support "tel" urls, These URLs start with "tel:" instead of "http:", and can be used to create "call me" links on web pages. Usually, if a user clicks on one of these links, the phone will present a dialog, confirming if the user would like to "dial" the number.
However, some Android phones use special dial codes to access some of the phone's features. These codes are known as USSD codes (Unstructured Suplemental Service Data), and reasonably well documented. For example, if you type "*#06#" on your phone, it will show it's IMEI number before you hit "dial" (this works on most GSM phones, not just Android phones). Some Android phones add their own proprietary codes. For example, the Samsung Galaxy S3 phone has a code like this to perform a factory reset, which will delete all data on the phone, and once started, can not be canceled. As no "dial" action is required for these codes, just clicking the URL will execute the feature.
Here a quick test link that will show the IMEI: *#06# (iPhones will ask for confirmation first)
Demo video: http://www.youtube.com/watch?v=Q2-0B04HPhs
------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter
Comments