vimarsana.com


The “KindleDrip” attack would have allowed attackers to siphon money from unsuspecting victims.
Three vulnerabilities in the Amazon Kindle e-reader would have allowed a remote attacker to execute code and run it as root – paving the way for siphoning money from unsuspecting users.
Yogev Bar-On, researcher at Realmode Labs, found that it was possible to email malicious e-books to the devices via the “Send to Kindle” feature to start a chain of attack – a discovery that earned him $18,000 from the Amazon bug-bounty program.
“The first vulnerability allowed an attacker to send an e-book to the victim’s Kindle device,” he explained in a Thursday posting. “Then, the second vulnerability was used to run arbitrary code while the e-book is parsed, under the context of a weak user. The third vulnerability allows the attacker to escalate privileges and run code as root.”

Related Keywords

,Amazon Kindle ,Realmode Labs ,Global Offset Table ,Hacks ,Malware ,Vulnerabilities ,Web Security ,Mobile Security ,Privacy ,அமேசான் கைஂடல் ,உலகளாவிய ஆஃப்செட் மேசை ,ஹேக்ஸ் ,தீம்பொருள் ,வலை பாதுகாப்பு ,கைபேசி பாதுகாப்பு ,ப்ரைவஸீ ,

© 2025 Vimarsana

vimarsana.com © 2020. All Rights Reserved.