@ william Kibira,  for the linux part, i dont think it would be as easy as
that given the fact that linux handles executables or any thing that can be
excuted in a different manner... for the malware or whatever to be
persistent on your linux system, it would have to get installed and that is
where one of the major differences between linux and windows kicks in.... i
can install software in guest mode in a windows system but in linux.... wow
that would be impossible without sudoer's password etc so for the malware
to install itself, it would need to somehow acquire admin rights in linux
which would not be possible... unless if it is using an zero day
exploit.... a feat better left to NSA, and some few western government
intelligence services


*Kizito Mudambo*


On Sun, Aug 18, 2013 at 7:26 PM, William Kibira <[email protected]>wrote:

> You would have to figure out how the mobile partner itself responds to the
> text messages, or you could do a two way deployment attack, one part
> delivers the virus and two is that the text message is a trigger. Or Worse,
> text messages are just files, probably with an extension and a structure to
> ID them as such, if you could push a virus/Worm that can morph with the
> current text message extension then it can be sent as a text message and
> then on reaching the mobile partner, it can execute using the rights that
> the mobile partner uses since it will have  reached its destination.
>
> As far as Linux is concerned, There are Linux mobile partners and i also
> realized that Linux can send and receive text messages via Bluetooth and
> via modem, it just requires one to have the GUI component installed since
> modem manager can actually send and receive text messages and if your using
> a modern distribution of Linux then you have this running.
>
>
>
>
> On Sun, Aug 18, 2013 at 7:07 PM, Benjamin Tayehanpour <
> [email protected]> wrote:
>
>> The vulnerability isn't in the modem hardware itself, it's in that
>> piece-of-crap software bundled with it. Linux users should be
>> completely unaffected by this bug, as should any Windows user who
>> didn't install (or at least aren't using) the completely unnecessary
>> dial-up software. From *at least* Windows XP onwards, it's perfectly
>> possible to add a dial-up connection using Windows's regular
>> mechanisms for such things, rendering the bundled software a complete
>> waste of resources. Having unnecessary code (especially closed,
>> non-peer-reviewed code) running is always a potential security risk.
>>
>> On 18 August 2013 08:15, roy mukasa <[email protected]> wrote:
>> > Vulnerability in USB modems allows hacker to access miliions of
>> computers
>> > remotely.
>> >
>> > Read more about it here
>> >
>> > Regards
>> >
>> > --
>> > Creativity is intelligence having fun...
>> >
>> > _______________________________________________
>> > The Uganda Linux User Group: http://linux.or.ug
>> >
>> > Send messages to this mailing list by addressing e-mails to:
>> [email protected]
>> > Mailing list archives: http://www.mail-archive.com/[email protected]/
>> > Mailing list settings: http://kym.net/mailman/listinfo/lug
>> > To unsubscribe: http://kym.net/mailman/options/lug
>> >
>> > The Uganda LUG mailing list is generously hosted by INFOCOM:
>> > http://www.infocom.co.ug/
>> >
>> > The above comments and data are owned by whoever posted them (including
>> > attachments if any). The mailing list host is not responsible for them
>> in
>> > any way.
>> _______________________________________________
>> The Uganda Linux User Group: http://linux.or.ug
>>
>> Send messages to this mailing list by addressing e-mails to:
>> [email protected]
>> Mailing list archives: http://www.mail-archive.com/[email protected]/
>> Mailing list settings: http://kym.net/mailman/listinfo/lug
>> To unsubscribe: http://kym.net/mailman/options/lug
>>
>> The Uganda LUG mailing list is generously hosted by INFOCOM:
>> http://www.infocom.co.ug/
>>
>> The above comments and data are owned by whoever posted them (including
>> attachments if any). The mailing list host is not responsible for them in
>> any way.
>>
>
>
> _______________________________________________
> The Uganda Linux User Group: http://linux.or.ug
>
> Send messages to this mailing list by addressing e-mails to:
> [email protected]
> Mailing list archives: http://www.mail-archive.com/[email protected]/
> Mailing list settings: http://kym.net/mailman/listinfo/lug
> To unsubscribe: http://kym.net/mailman/options/lug
>
> The Uganda LUG mailing list is generously hosted by INFOCOM:
> http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The mailing list host is not responsible for them in
> any way.
>
_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM: 
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The mailing list host is not responsible for them in any 
way.

Reply via email to