Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Cellular Security"

From NetSec
Jump to: navigation, search
Line 1: Line 1:
 
{{Expand}}
 
{{Expand}}
 +
Cellular Security is the area of security involved with mobile communication networks.
 +
 
A largely undocumented [[vulnerability]] in wireless phones (cellular phones) involves something called SIS Attachment Exploitation. SIS attachments are the picture and video attachments that can be attached to SMS text messages and sent phone to phone. Because most vendors do not check buffers surrounding this attachment zone, it is easy for an attacker to overflow the buffer and cause arbitrary [[machine code]] to be executed. It is for this reason that cellular phones should also never be trusted with sensitive data.
 
A largely undocumented [[vulnerability]] in wireless phones (cellular phones) involves something called SIS Attachment Exploitation. SIS attachments are the picture and video attachments that can be attached to SMS text messages and sent phone to phone. Because most vendors do not check buffers surrounding this attachment zone, it is easy for an attacker to overflow the buffer and cause arbitrary [[machine code]] to be executed. It is for this reason that cellular phones should also never be trusted with sensitive data.
  
 
Most cellular phones vulnerable to this method of exploitation are not x86, and therefore x86-related shellcode will not work. Some architectures more likely on cellular devices include:
 
Most cellular phones vulnerable to this method of exploitation are not x86, and therefore x86-related shellcode will not work. Some architectures more likely on cellular devices include:
 
:*ARM
 
:*ARM

Revision as of 21:08, 13 August 2012

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.

Cellular Security is the area of security involved with mobile communication networks.

A largely undocumented vulnerability in wireless phones (cellular phones) involves something called SIS Attachment Exploitation. SIS attachments are the picture and video attachments that can be attached to SMS text messages and sent phone to phone. Because most vendors do not check buffers surrounding this attachment zone, it is easy for an attacker to overflow the buffer and cause arbitrary machine code to be executed. It is for this reason that cellular phones should also never be trusted with sensitive data.

Most cellular phones vulnerable to this method of exploitation are not x86, and therefore x86-related shellcode will not work. Some architectures more likely on cellular devices include:

  • ARM