Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
Vulnerabilities in certain mobile phone Bluetooth implementations
Posted on 17-Nov-2003 23:49 | Filed under: News

Vulnerabilities in certain mobile phone Bluetooth implementations
ALD, a company specialising in consultancy and security, identified a couple of vulnerabilities in the way Bluetooth is implemented in some popular mobile phone models.

The company put togheter a page with an explanation in general lines of two possible different attacks to certain Bluetooth enabled mobile phone models. The authors are Adam Laurie (Managing Director and Chief Security Officer of A.L. Digital Ltd.) and Ben Laurie (Technical Director of A.L. Digital, author of Apache-SSL).

SNARF attack:

Also called Bluesnarf. "It is possible, on some makes of device, to connect to the device without alerting the owner of the target device of the request, and gain access to restricted portions of the stored data therein, including the entire phonebook (and any images or other data associated with the entries), calendar, realtime clock, business card, properties, change log etc. This is normally only possible if the device is in "discoverable" or "visible" mode, but there are tools available on the Internet that allow even this safety net to be bypassed [the article refers to bluesniff, btscanner and redfang]."

BACKDOOR attack:

"The backdoor attack involves establishing a trust relationship through the "pairing" mechanism, but ensuring that it no longer appears in the target's register of paired devices. In this way, unless the owner is actually observing their device at the precise moment a connection is established, they are unlikely to notice anything untoward, and the attacker may be free to continue to use any resource that a trusted relationship with that device grants access to (but note that so far we have only tested file transfers). This means that not only can data be retrieved from the phone, but other services, such as modems or Internet, WAP and GPRS gateways may be accessed without the owner's knowledge or consent. Indications are that once the backdoor is installed, the above SNARF attack will function on devices that previously denied access, and without the restrictions of a plain SNARF attack, so we strongly suspect that the other services will prove to be available also."

With the latest craze about Bluejacking, the company expects that unaware users could allow attackers to establish a partnership without realising the implications of this, and be susceptible to these attacks.

The company did not disclose the proof-of-concept tools developed to demonstrated these flaws, but accepts contacts from handset manufacturers to transfer these programs.


More information: http://www.bluestumbler.org/...
Trending now »

Hot discussions in our forums right now:

Home insurance: Do you live in an area at high risk of natural disasters?
Created by frednz, last reply by frednz on 14-Nov-2018 20:19 (57 replies)
Pages... 2 3 4


Warped post on 8 month old fence, who's responsible for repair?
Created by Paul1977, last reply by Paul1977 on 17-Nov-2018 14:12 (61 replies)
Pages... 3 4 5


Wanted: Working 5.25 Inch Floppy Drive
Created by Lias, last reply by Spirax on 14-Nov-2018 19:23 (18 replies)
Pages... 2


Spark VDSL Upload Speed Issues Vigor 2860 + Troubleshooting Info
Created by bener, last reply by bener on 15-Nov-2018 12:34 (29 replies)
Pages... 2


Bunnings delivers onion-then-sausage directive
Created by Mspec, last reply by MikeB4 on 16-Nov-2018 12:33 (27 replies)
Pages... 2


Geekzone giveaway: Nokia 7.1 smartphone
Created by freitasm, last reply by mdf on 17-Nov-2018 15:01 (143 replies)
Pages... 8 9 10


Controlled/uncontrolled metering (electricity)?
Created by danepak, last reply by danepak on 16-Nov-2018 23:58 (11 replies)

Joining Orcon but concern about phone line
Created by super12345, last reply by super12345 on 15-Nov-2018 17:45 (11 replies)