«
Expand/Collapse
58 items tagged "samsung"
Related tags:
vulnerabilities [+],
overflow [+],
kies [+],
galaxy [+],
proof of concept [+],
null pointer [+],
null [+],
vulnerability [+],
samsung printer [+],
printer [+],
hacks [+],
g touch [+],
exploits [+],
code execution [+],
world writeable [+],
world [+],
viewer [+],
site [+],
security [+],
samsung tv [+],
root compromise [+],
remote controllers [+],
overwrite [+],
multiple [+],
integer overflow [+],
information disclosure [+],
com [+],
buffer overflow vulnerabilities [+],
buffer overflow [+],
buffer [+],
backdoor [+],
administrator account [+],
active x [+],
access control [+],
x seh [+],
update [+],
smart [+],
security vulnerabilities [+],
phone [+],
laptops [+],
firmware [+],
denial of service [+],
allshare [+],
workaround [+],
windows [+],
wide [+],
ware [+],
vibrant [+],
via [+],
usb cable [+],
unauthorized access [+],
tv remote controller [+],
tv models [+],
toner [+],
system registry [+],
system [+],
synchronization utility [+],
standby battery life [+],
smartphones [+],
smart tvs [+],
smart tv [+],
shipping [+],
series 3 [+],
security hole [+],
security flaw [+],
security firm [+],
samsung handsets [+],
s ii [+],
riesco [+],
researchers [+],
researcher [+],
quick [+],
problemi [+],
privilege escalation vulnerability [+],
printers [+],
poc [+],
phones [+],
pearl [+],
offers [+],
null pointer dereference [+],
nokia [+],
nfc [+],
mode [+],
mic input [+],
mic [+],
magic number [+],
local privilege escalation [+],
local [+],
linux [+],
keyloggers [+],
kalin [+],
iphone 5 [+],
iphone 4 [+],
iphone [+],
ipad [+],
home [+],
hmx t [+],
hmx [+],
guard interval [+],
gt s [+],
google [+],
galaxies [+],
found [+],
flaw [+],
fix [+],
firm [+],
finds [+],
feature phones [+],
feature phone [+],
external interface [+],
exploit [+],
error light [+],
epic [+],
entertainment [+],
engadget [+],
dual mode phone [+],
digital [+],
didn [+],
denial [+],
dell [+],
damages [+],
crack [+],
court [+],
controller [+],
comprato [+],
chrome [+],
cellphones [+],
cameras [+],
buffer overflow vulnerability [+],
beamed [+],
bd products [+],
apple awarded [+],
apple [+],
andrew [+],
aes encryption [+],
activex buffer overflow [+],
Wireless [+],
Fixes [+],
ARM [+],
1 billion [+],
net i [+]
-
-
16:00
»
SecuriTeam
Samsung Kies is prone to multiple security vulnerabilities.
-
-
17:00
»
SecuriTeam
Multiple vulnerabilities have been found in Samsung Kies synchronization utility that allows remote attacker to compromise affected system, execute and modify arbitrary files, modify arbitrary directories and modify System Registry with privileges of the current user.
-
14:38
»
Packet Storm Security Exploits
Samsung Kies version 2.3.2.12054_20 suffers from a null pointer dereference and multiple improper access control vulnerabilities.
-
-
17:00
»
SecuriTeam
Samsung TV and BD products that support the 'Samsung Remote' mobile application are prone to multiple denial-of-service vulnerabilities.
-
-
17:00
»
SecuriTeam
Samsung NET-i Viewer is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input.
-
17:00
»
SecuriTeam
Samsung NET-i ware is prone to multiple denial-of-service and remote code-execution issues.
-
-
19:38
»
Packet Storm Security Exploits
Some system directories on the Samsung Galaxy S2 for Sprint-US (Epic 4G Touch) are world-writable and allow for information disclosure, modification, and may lead to local root compromise of the device.
-
19:38
»
Packet Storm Security Recent Files
Some system directories on the Samsung Galaxy S2 for Sprint-US (Epic 4G Touch) are world-writable and allow for information disclosure, modification, and may lead to local root compromise of the device.
-
19:38
»
Packet Storm Security Misc. Files
Some system directories on the Samsung Galaxy S2 for Sprint-US (Epic 4G Touch) are world-writable and allow for information disclosure, modification, and may lead to local root compromise of the device.
-
-
17:00
»
SecuriTeam
Google Chrome OS for Cr-48, Samsung Series 5, Samsung Chromebox Series 3, and 5 550 Chromebook platforms is prone to multiple unspecified vulnerabilities.
-
10:38
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability in the CNC_Ctrl.dll ActiveX installed with the Samsung NET-i viewer 1.37. Specifically, when supplying a long string for the fname parameter to the BackupToAvi method, an integer overflow occurs, which leads to a posterior buffer overflow due to the use of memcpy with an incorrect size, resulting in remote code execution under the context of the user.
-
10:38
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability in the CNC_Ctrl.dll ActiveX installed with the Samsung NET-i viewer 1.37. Specifically, when supplying a long string for the fname parameter to the BackupToAvi method, an integer overflow occurs, which leads to a posterior buffer overflow due to the use of memcpy with an incorrect size, resulting in remote code execution under the context of the user.
-
10:38
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability in the CNC_Ctrl.dll ActiveX installed with the Samsung NET-i viewer 1.37. Specifically, when supplying a long string for the fname parameter to the BackupToAvi method, an integer overflow occurs, which leads to a posterior buffer overflow due to the use of memcpy with an incorrect size, resulting in remote code execution under the context of the user.
-
-
23:36
»
Packet Storm Security Exploits
Samsung devices with support for remote controllers suffer from endless restart and possible buffer overflow vulnerabilities. Proof of concept code included.
-
23:36
»
Packet Storm Security Recent Files
Samsung devices with support for remote controllers suffer from endless restart and possible buffer overflow vulnerabilities. Proof of concept code included.
-
23:36
»
Packet Storm Security Misc. Files
Samsung devices with support for remote controllers suffer from endless restart and possible buffer overflow vulnerabilities. Proof of concept code included.
-
-
11:17
»
Hack a Day
[Andrew] was getting ready to print out an assignment when his Samsung printer suddenly started blinking a red error light at him. Unable to find any documentation explaining the issue, he called Samsung directly and found that it was indicating the toner cartridge was nearly empty. He held down the button that prints a test [...]
-
-
11:26
»
Wirevolution
Technically the iPhone 4S doesn’t really pull ahead of the competition: Android-based phones like the Samsung Galaxy S II.
The iPhone 4S even has some worse specifications than the iPhone 4. It is 3 grams heavier and its standby battery life is 30% less. The screen is no larger – it remains smaller than the standard set by the competition. On the other hand the user experience is improved in several ways: the phone is more responsive thanks to a faster processor; it takes better photographs; and Apple has taken yet another whack at the so-far intractable problem of usable voice control. A great benefit to Apple, though not so much to its users, is that the new Qualcomm baseband chip works for all carriers worldwide, so Apple no longer needs different innards for AT&T and Verizon (though Verizon was presumably disappointed that Apple didn’t add a chip for LTE support).
Since its revolutionary debut, the history of the iPhone has been one of evolutionary improvements, and the improvements of the iPhone 4S over the iPhone 4 are in proportion to the improvements in each of the previous generations. The 4S seems to be about consolidation, creating a phone that will work on more networks around the world, and that will remain reliably manufacturable in vast volumes. It’s a risk-averse, revenue-hungry version, as is appropriate for an incumbent leader.
The technical improvements in the iPhone 4S would have been underwhelming if it had been called the iPhone 5, but for a half-generation they are adequate. By mid-2012 several technologies will have ripened sufficiently to make a big jump.
First, Apple will have had time to move their CPU manufacturing to TSMC’s 28 nm process, yielding a major improvement in battery life from the 45 nm process of the current A5, which will be partially negated by the monstrous power of the rumored 4-core A6 design, though the Linley report cautions that it may not be all plain sailing.
Also by mid-2012 Qualcomm may have delivered a world-compatible single-chip baseband that includes LTE (aka ‘real 4G’).
But the 2012 iPhone faces a serious problem. It will continue to suffer a power, weight and thin-ness disadvantage relative to Samsung smartphones until Apple stops using LCD displays. Because they don’t require back-lighting, Super AMOLED display panels are thinner, lighter and consume less power than LCDs. Unfortunately for Apple, Samsung is the leading supplier of AMOLED displays, and Apple’s relationship with Samsung continues to deteriorate. Other LCD alternatives like Qualcomm’s Mirasol are unlikely to be mature enough to rely on by mid-2012. The mid-2012 iPhone will need a larger display, but it looks as though it will continue to be a thick, power hungry LCD.
-
-
16:22
»
Hack a Day
[Kalin] loved the picture from his new Samsung HMX-T10 camcorder, but the sound quality didn’t match up. Since it records video that can be directly imported to his editing suite of choice he didn’t want to just buy a different model, so he cracked it open and added an external mic input. As with most [...]
-
-
8:00
»
Hack a Day
If you’ve got a Samsung Vibrant and want to take advantage of that unlimted 3G account you can tether without rooting the phone. This method uses a USB cable to provide internet access to Windows XP and Windows 7 computers. Samsung’s own Kies software handles the tethering, as long as you have the magic number [...]
-
-
8:49
»
Wirevolution
We are half way through the year, so it’s time for another look at Wi-Fi phone certifications. Three things jump out this time. First, a leap in the number of Wi-Fi phone models in the second quarter of 2010. Second, the arrival of 802.11n in handsets, and third Samsung’s market-leading commitment to 802.11n. According to Rethink Wireless “Samsung’s share of the smartphone market was only about 5% in Q1 but it aims to increase this to almost 15% by year end.” Samsung Wi-Fi-certified a total of 73 dual mode phones in the first six months of 2010, three times as many as second place LG with 23. In the 11n category, Samsung’s lead was even more dominating: its 40 certifications were ten times either of the second place OEMs.
Here is a chart of dual mode phones certified with the Wi-Fi Alliance from 2008 to June 30th 2010. We usually do this chart stacked, but side-by-side gives a clearer comparison between feature phones and smart phones. Note that up to the middle of 2009, smart phones outpaced feature phones, but then it switched. This is a natural progression of Wi-Fi into the mass market, but may also be exaggerated by a quirk of reporting: of HTC’s 17 certifications in the first half of 2010, it only categorized one as a smart phone.

The chart below shows the growth of 802.11n. It starts in January 2010 because only one 11n phone was certified in 2009, at the end of December. As you can see, the growth is strong. I anticipate that practically all new dual mode phone certifications will be for 802.11n by the end of 2010.

Below is the same chart sliced by manufacturer instead of by month. The iPhone is missing because it wasn’t certified until July, and the iPad is missing because it’s not a phone. With only one 802.11n phone, Nokia has become a technology laggard, at least in this respect. The RIM Pearl 8100/8105 certifications are the only ones with STBC, an important feature for phones because it improves rate at distance. All the major chips (except those from TI) support STBC, so the phone OEMs must be either leaving it disabled or just not bothering to certify for it.

-
-
11:09
»
Hack a Day
[Erdem] sent us an update on his work with the SamyGO project. You may remember this Samsung TV firmware hacking initiative from our post back in October. Since then many more TV models have been added to the compatible list. They have also worked out a way to defeat the AES encryption and RSA signature [...]
-
-
2:49
»
remote-exploit & backtrack
ho comprato un samsung r 519 e ho problemi con il wireless...non riesco a connetterlo a nessun router come faccio?