Published: 2015/03/27  Last Updated: 2015/03/27

Information from Disney Mobile on SoftBank

Vulnerability ID:JVN#81094176
Title:Android OS may behave as an open resolver
Status:Vulnerable

This is a statement from the vendor itself with no modification by JPCERT/CC.

Basically, there is no influence as to vulnerability for Softbank 3G/4G LTE network
and Softbank Wi-Fi Spot users as well as Wi-Fi tethering users.

There may be a possibility that without noticing you may get involved with unauthorized
behavior by third party if you connect with unreliable Wi-Fi access point and
activate USB or Bluetooth tethering function.

The listed models have the reported vulnerability.


#Fixed

The following handsets users are encouraged to update the models.
Their latest software and application versions fix it.

- SHARP handsets
DM014SH (Fix-2014/11/20 release software)
http://www.disney.co.jp/mobile/s/news/service/20141120_01.html


#Under study

- SHARP handsets DM016SH
- KYOCERA handsets DM015K