TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Billions of devices imperiled by new clickless Bluetooth attack

284 pointsby mconeover 7 years ago

16 comments

sillysaurus3over 7 years ago
Stuff like this is why physical pentesting is so effective. If you sneak into a company and stick a raspi in a corner, nobody tends to notice a black box amidst a bunch of cables. But that black box can attack the dev machines in a variety of ways: it can be a honeypot wifi AP until someone accidentally connects to it, at which point you have creds for the real network. Then you can connect to the real network and look for workstations to attack. Or, as this article points out, you might be able to use a tricky bluetooth attack to get onto the workstations directly.<p>I&#x27;m not sure there&#x27;s any way to protect against this. Physical pentesters tend to get caught less than 10% of the time. It&#x27;s very easy to sneak into a building if you know what you&#x27;re doing and have confidence. And &quot;knowing what you&#x27;re doing&quot; generally consists of &quot;dress up like a construction worker xor interviewee.&quot;
评论 #15228361 未加载
评论 #15228245 未加载
评论 #15228127 未加载
评论 #15233421 未加载
评论 #15232860 未加载
评论 #15235443 未加载
评论 #15229418 未加载
bjt2n3904over 7 years ago
Link to the whitepaper.<p><a href="http:&#x2F;&#x2F;go.armis.com&#x2F;hubfs&#x2F;BlueBorne%20Technical%20White%20Paper.pdf" rel="nofollow">http:&#x2F;&#x2F;go.armis.com&#x2F;hubfs&#x2F;BlueBorne%20Technical%20White%20Pa...</a><p>Part of the attack is on BlueZ&#x27;s implementation.<p>&gt; In BlueZ’s case, L2CAP is included as part of the core Linux kernel code. This is a rather dangerous choice. Combining a fully exposed communication protocol, arcane features like EFS and a kernel space implementation is a recipe for trouble.
评论 #15227899 未加载
评论 #15228414 未加载
brndnmtthwsover 7 years ago
As a slightly related side note, I pretty much only turn on bluetooth when I actually need to use it (which is rarely, such as syncing my Garmin every now and then). It&#x27;s a waste of battery power to keep it on, and Bluetooth is also often used to track people. For example, it&#x27;s used by traffic monitoring systems to measure the speed of traffic[1] by storing and tracking the MAC address.<p>It would be nice if Android and iOS provided a convenient way to activate Bluetooth temporarily, only when needed.<p>[1]: <a href="http:&#x2F;&#x2F;www.tyco-its.com&#x2F;products-and-services&#x2F;urban-traffic-control&#x2F;bluetooth-travel-timespeed-measurement-system" rel="nofollow">http:&#x2F;&#x2F;www.tyco-its.com&#x2F;products-and-services&#x2F;urban-traffic-...</a>
评论 #15228020 未加载
评论 #15227908 未加载
评论 #15228030 未加载
评论 #15229667 未加载
评论 #15228217 未加载
评论 #15228668 未加载
评论 #15235118 未加载
评论 #15227875 未加载
评论 #15228046 未加载
评论 #15232297 未加载
codedokodeover 7 years ago
From description of vulnerability in Linux Kernel bluetooth code:<p>&gt; This function receives a configuration response buffer in the rsp argument, and its length in the len argument<p>&gt; Each element it unpacks from the configuration response is validated and then packed back onto a response buffer, which is pointed to by the data argument.<p>&gt; However, the size of this response buffer is not passed into the function<p>C developers are repeating the same mistake for years. Why don&#x27;t they invent some type or class for safe work with memory buffers?
评论 #15231679 未加载
评论 #15238435 未加载
评论 #15234390 未加载
joe890over 7 years ago
&gt;It&#x27;s already patched.<p>This refrain is tired and myopic.<p>We must operate with the assumption that like BadUSB, heartbleed, and this latest attack, there are likely devastating vulnerabilities present in all devices we use and actors may have the chance to exploit them before we ever become aware of them or have the opportunity to apply a patch.
debunnover 7 years ago
We&#x27;ve had a number of folks at work ask if their Android phone will be patched, so I thought it would be helpful to list the Android Open Source Project (aka: device operating system) versions that will be receiving the necessary patches [0]:<p>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0<p>Note: it will likely take some time for your handset manufacturer to test and release the patch for your specific phone.<p>0: <a href="https:&#x2F;&#x2F;source.android.com&#x2F;security&#x2F;bulletin&#x2F;2017-09-01" rel="nofollow">https:&#x2F;&#x2F;source.android.com&#x2F;security&#x2F;bulletin&#x2F;2017-09-01</a> (see CVE-2017-0781, 0782, 0783 and 0785)
blfrover 7 years ago
Of course my Motorola (X Play) is getting no updates so I get to spend the evening installing LineageOS and reconfiguring the phone. Should have treated it like a computer: wipe the manufacturer&#x27;s software right away and install a free alternative.<p>Pretty sad that random opensource projects are offering better support than the companies I paid for their products.
baucover 7 years ago
Is that why Google Play Protect was recommending to disable Bluetooth Share which seems to have caused a lot of issues for people. Turning it back on requires to reset all app preferences.
pmontraover 7 years ago
I got the update from Sony while I was reading the post. It&#x27;s an Xperia X Compact and they&#x27;ve made a good job so far. Almost an update per month, it started with Android 6 and it&#x27;s on Android 7.1.1 now, September patch level, which is safe according to the post.<p>Bluez for Ubuntu 16.04 LTS instead is old, from March 2016. There is a newer Bluez from August 2017 but it&#x27;s probably for newer versions of Ubuntu. I hope they patch it quickly for everybody.
Animatsover 7 years ago
Is it a C buffer overflow?<p>- Edit: Yes, it is, on the stack.
jgaaover 7 years ago
So, I guess it&#x27;s back to using wired headphones with the phone...
评论 #15227895 未加载
评论 #15227824 未加载
jasonmaydieover 7 years ago
Chalk one up for Windows Phone. Security through obscurity, on a more serious note does the flaw happen because of a common opensource implementation?
评论 #15228824 未加载
baybal2over 7 years ago
I wonder, if a physical &quot;chain reaction&quot; attack described is possible.<p>Back in mid naughties, the &quot;MMS of death&quot; chain reaction attacks on Sony Ericsson phones were so intense, that they were taking down cell networks through which they propagated, thus fizzling.
mpclarkover 7 years ago
I&#x27;ve noticed that, starting quite recently, Bluetooth has always been off every time I&#x27;ve gone to use it on my trusty old Nexus 5. I figured it was the sort of bug that tends to accumulate on old phones, but maybe not eh?
mtzaldoover 7 years ago
Is the playstation 3&#x2F;4 vulnerable to this?
azinman2over 7 years ago
What is the actual exploit? Article was very thin on details....
评论 #15228163 未加载