exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

JavaPhone.txt

JavaPhone.txt
Posted Oct 27, 2004
Authored by Adam Gowdiak | Site man.poznan.pl

Two very serious security vulnerabilities in Java technology for mobile devices (Java 2 Micro Edition) affects about 250 million mobile phones coming from Nokia, Siemens, Panasonic, Samsung, Motorola and others. Sun has refused to release an alert regarding these issues. Information about these flaws has been published at Hack In the Box Security Conference earlier this month in Kuala Lumpur, Malaysia.

tags | advisory, java, vulnerability
SHA-256 | b5205c34f95361edb616b9b5160c4caade01ca0f30aebdbc019a5cfb22606cd6

JavaPhone.txt

Change Mirror Download

Hello all,

Since I received information from SUN Microsystems that they did not
plan to release
Sun Alert for the issues I found in their CLDC [1] reference
implementation, I would
like to announce the following.

I found two very serious security vulnerabilities in Java technology for
mobile
devices (Java 2 Micro Edition) that might be affecting about 250
millions [2] of
mobile phones coming from Nokia, Siemens, Panasonic, Samsung, Motorola
and others
[3]. Information about these flaws has been published at Hack In the Box
Security
Conference [4] earlier this month in Kuala Lumpur, Malaysia.

Both vulnerabilities are implementation flaws in bytecode verifier
component of
KVM (Java Virtual Machine for mobile devices) developed by SUN
Microsystems. Each
of the flaws can be used to completely break Java security (Java type
and memory
safety) on a mobile device and to obtain access to the phone data and
underlying
operating system's functionality.

I verified on my Nokia DCT4 phone that malicious code exploiting one of
the flaws
can steal data from the phone (i.e. phonebook, SMS messages), establish
communication
with the Internet, send arbitrary SMS messages, write permanent memory
of the phone
(FLASH), interfere with or intercept IPC communication occuring between
native Nokia
OS tasks, install resident code on the phone. Any of the aforementioned
actions can
be conducted without user knowledge and permission.

I would like to emphasize that although escaping the KVM sandbox and
breaking Java
type and memory safety is almost straightforward, conducting malicious
actions on
a given device is rather difficult as it usually requires deep knowledge
about the
internal operation of the underlying OS (I spent four months reverse
engineering
Nokia OS before I could do anything malicious from Java appplication on
my phone).

I plan to release a research paper with all the details about the flaws
including
device specific information and some additional material that didn’t fit
into my
HITB talk, in a couple of months (1Q 2005).

Best Regards
Adam Gowdiak

Security Team of
POZNAN SUPERCOMPUTING AND NETWORKING CENTER
http://www.man.poznan.pl

[1] http://java.sun.com/products/cldc/
[2] http://media.corporate-ir.net/media_files/NYS/NOK/Beijing/mestaranta.pdf
[3] http://jal.sun.com/webapps/device/device
[4] http://conference.hackinthebox.org


Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    21 Files
  • 27
    Aug 27th
    28 Files
  • 28
    Aug 28th
    15 Files
  • 29
    Aug 29th
    41 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close