[Owasp-mobile-security-project] BlackBerry Balance Breach via Adobe Flash

Zach Lanier zach at n0where.org
Fri Jun 14 16:20:48 UTC 2013


Actually, the first was a leak of the auth token via PPS --
http://www.slideshare.net/quineslideshare/voightkampffing-the-blackberry-playbook-12640279/53
-- RIM/BB declined to issue an advisory for it.
--
Zach Lanier | http://n0where.org/
Voice: (646) 580-4298 | SilentCircle: (561) 221-6384
FP: 8524 B3D7 C4BC 70C6 D1F1 5E4D 95D9 6AAC 3BB8 6CAC


On Thu, Jun 13, 2013 at 9:56 PM, Jeffrey Walton <noloader at gmail.com> wrote:
> It looks like the first breach across Work/Play for BlackBerry has
> occurred courtesy of Adobe (what a surprise ;). It does not look like
> its easy to exploit, though.
>
> http://www.infosecurity-us.com/view/32938/blackberry-patches-byod-adobe-flash-flaws-for-z10-and-playbook/
> _______________________________________________
> Owasp-mobile-security-project mailing list
> Owasp-mobile-security-project at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-mobile-security-project


More information about the Owasp-mobile-security-project mailing list