Jump to content

Orange San Diego is vulnerable to the USSD exploit. Act NOW before scrotes wipe your phone


Recommended Posts

Posted (edited)

Edit: this only affects those using Gingerbread (Android 2.3.7), Ice Cream Sandwich and above users (4.x and above) are not affected, basically, if you know you haven't updated Android on your device, you are probably vulnerable, and need to install Telstop.

There is a vulnerability in the dialer which causes the dialer to blindly run USSID codes when the browser visits a specifically crafted link. This is the same vulnerability that the Samsung Galaxy S3 has been reportedly suffering from.

To test your device:

http://dylanreeve.com/phone.php

if your phone shows an Imei number, then you're vulnerable. If you only see a code in the dialer, you're okay. My San Diego is sadly at risk. It's easy enough to fix yourself by installing another dialer (SEE EDIT BELOW FOR BETTER FIX) which will cause a choice dialog box to show, which you can then cancel. Advice is given in the above url.

I don't know if this is being used 'in the wild' yet, but you should act now before it happens.

Edit for a better fix: Install Telstop from the Google Play Market. Run the test above again, and set Telstop to be the default action when you get the choice. From now on, Telstop will 'vet' the link to make sure it's safe. If it is safe, it will proceed as normal with your normal dialler. If it thinks it's unsafe, it will warn you, so you have the choice to cancel.

Edited by Ribs85
Posted (edited)

Crap me too :angry: :(

Using touchpal dialer and it still shows IME!

Edited by Guest
Guest iam_smithers
Posted

Download an app called TelStop from off the Play Store, and that will stop the exploit from working.

Guest Immortal7
Posted

I have installed tel stop, is that it? Instal and forget?

Guest BlueMoonRising
Posted (edited)

Cheers for the heads up. I can confirm that Go Dialer stops the exploit. You get the confirm which app to use option.

Edit :- you don't of course set the "use this option by default" tick box, but you knew that anyway didn't you?

Edited by BlueMoonRising
Guest BlueMoonRising
Posted

hi i've instaled telstop and tested the link http://dylanreeve.com/phone.php

it say : telstop warning likely malicious tel:*%2306%23

is my phone still vulnerable ? sorry i'm a beginner XD

Only if you're daft enough to click the "call" button rather than "cancel".

Guest stephane75011
Posted

Of course i cliked cancel ^^

thanks for your fast reply

Guest xgt001
Posted

Tested. The vulnerability is fixed in the latest ICS update :)

Guest punjuk12
Posted

Do you think that this was why they delayed the launch, so they could fix the exploit?

Guest xgt001
Posted

i think this explains the one week delay.. not too sure though

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.