You would have to figure out how the mobile partner itself responds to the
text messages, or you could do a two way deployment attack, one part
delivers the virus and two is that the text message is a trigger. Or Worse,
text messages are just files, probably with an extension and a structure to
ID them as such, if you could push a virus/Worm that can morph with the
current text message extension then it can be sent as a text message and
then on reaching the mobile partner, it can execute using the rights that
the mobile partner uses since it will have  reached its destination.

As far as Linux is concerned, There are Linux mobile partners and i also
realized that Linux can send and receive text messages via Bluetooth and
via modem, it just requires one to have the GUI component installed since
modem manager can actually send and receive text messages and if your using
a modern distribution of Linux then you have this running.




On Sun, Aug 18, 2013 at 7:07 PM, Benjamin Tayehanpour <
[email protected]> wrote:

> The vulnerability isn't in the modem hardware itself, it's in that
> piece-of-crap software bundled with it. Linux users should be
> completely unaffected by this bug, as should any Windows user who
> didn't install (or at least aren't using) the completely unnecessary
> dial-up software. From *at least* Windows XP onwards, it's perfectly
> possible to add a dial-up connection using Windows's regular
> mechanisms for such things, rendering the bundled software a complete
> waste of resources. Having unnecessary code (especially closed,
> non-peer-reviewed code) running is always a potential security risk.
>
> On 18 August 2013 08:15, roy mukasa <[email protected]> wrote:
> > Vulnerability in USB modems allows hacker to access miliions of computers
> > remotely.
> >
> > Read more about it here
> >
> > Regards
> >
> > --
> > Creativity is intelligence having fun...
> >
> > _______________________________________________
> > The Uganda Linux User Group: http://linux.or.ug
> >
> > Send messages to this mailing list by addressing e-mails to:
> [email protected]
> > Mailing list archives: http://www.mail-archive.com/[email protected]/
> > Mailing list settings: http://kym.net/mailman/listinfo/lug
> > To unsubscribe: http://kym.net/mailman/options/lug
> >
> > The Uganda LUG mailing list is generously hosted by INFOCOM:
> > http://www.infocom.co.ug/
> >
> > The above comments and data are owned by whoever posted them (including
> > attachments if any). The mailing list host is not responsible for them in
> > any way.
> _______________________________________________
> The Uganda Linux User Group: http://linux.or.ug
>
> Send messages to this mailing list by addressing e-mails to:
> [email protected]
> Mailing list archives: http://www.mail-archive.com/[email protected]/
> Mailing list settings: http://kym.net/mailman/listinfo/lug
> To unsubscribe: http://kym.net/mailman/options/lug
>
> The Uganda LUG mailing list is generously hosted by INFOCOM:
> http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The mailing list host is not responsible for them in
> any way.
>
_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM: 
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The mailing list host is not responsible for them in any 
way.

Reply via email to