Jump to content

Orange San Diego is vulnerable to the USSD exploit. Act NOW before scrotes wipe your phone


Guest Ribs85

Recommended Posts

Edit: this only affects those using Gingerbread (Android 2.3.7), Ice Cream Sandwich and above users (4.x and above) are not affected, basically, if you know you haven't updated Android on your device, you are probably vulnerable, and need to install Telstop.

There is a vulnerability in the dialer which causes the dialer to blindly run USSID codes when the browser visits a specifically crafted link. This is the same vulnerability that the Samsung Galaxy S3 has been reportedly suffering from.

To test your device:

http://dylanreeve.com/phone.php

if your phone shows an Imei number, then you're vulnerable. If you only see a code in the dialer, you're okay. My San Diego is sadly at risk. It's easy enough to fix yourself by installing another dialer (SEE EDIT BELOW FOR BETTER FIX) which will cause a choice dialog box to show, which you can then cancel. Advice is given in the above url.

I don't know if this is being used 'in the wild' yet, but you should act now before it happens.

Edit for a better fix: Install Telstop from the Google Play Market. Run the test above again, and set Telstop to be the default action when you get the choice. From now on, Telstop will 'vet' the link to make sure it's safe. If it is safe, it will proceed as normal with your normal dialler. If it thinks it's unsafe, it will warn you, so you have the choice to cancel.

Edited by Ribs85
Link to comment
Share on other sites

Guest BlueMoonRising

Cheers for the heads up. I can confirm that Go Dialer stops the exploit. You get the confirm which app to use option.

Edit :- you don't of course set the "use this option by default" tick box, but you knew that anyway didn't you?

Edited by BlueMoonRising
Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.