« Microsoft Windows Shell Command Injection - MS12-048 (CVE-2012-0175) | Main | F4F Technology Helps You Analyze Applications For Security »

July 24, 2012


Lisa Peterson

Great Work! Clear and well documented... and No secret selling of '0 Days'!!


Very nice. Interesting read.


Nice research and good that it's been fixed.

But I really don't see how this can be exploted in the real world.

(open wlans or recursors owned by the attacker don't need this. I don't know where else an attacker out there should see a dns packet originating from the Android device.)

Roee Hay

Thanks for the feedback!:)

One example for an attack is closed wifi, to which the attacker has access (our PoC video demonstrates just that)

Mobile data networks are also attractive.

In either case, the attacker must be able to send spoofed DNS packets to the victim.

The comments to this entry are closed.

Follow us on Twitter

AppScan Free Trial

Try IBM Security AppScan software at no charge.

Become a Fan