« Microsoft Windows Shell Command Injection - MS12-048 (CVE-2012-0175) | Main | F4F Technology Helps You Analyze Applications For Security »

July 24, 2012


Lisa Peterson

Great Work! Clear and well documented... and No secret selling of '0 Days'!!


Very nice. Interesting read.


Nice research and good that it's been fixed.

But I really don't see how this can be exploted in the real world.

(open wlans or recursors owned by the attacker don't need this. I don't know where else an attacker out there should see a dns packet originating from the Android device.)

Roee Hay

Thanks for the feedback!:)

One example for an attack is closed wifi, to which the attacker has access (our PoC video demonstrates just that)

Mobile data networks are also attractive.

In either case, the attacker must be able to send spoofed DNS packets to the victim.

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Your comment could not be posted. Error type:
Your comment has been posted. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.


Post a comment

Your Information

(Name is required. Email address will not be displayed with the comment.)

Follow us on Twitter

AppScan Free Trial

Try IBM Security AppScan software at no charge.

Become a Fan