exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

tsa-053.txt

tsa-053.txt
Posted Nov 10, 2004
Site securescience.net

Secure Science Corporation Advisory TSA-053 - Ureach.com's Uscreen Desktop software is vulnerable to misuse and enables specific caller-id spoofing via the forward feature, enabling compromise of other communication services operating on PSTN or wireless networks.

tags | advisory, spoof
SHA-256 | 006f9cb5c45c247b15e043a6b78ad99810621540cc9699bc49518f8bfa564295

tsa-053.txt

Change Mirror Download
This is a multi-part message in MIME format.
--------------050908050904050106040702
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit


--------------050908050904050106040702
Content-Type: text/plain;
name="Ureach_Exploit"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline;
filename="Ureach_Exploit"

Secure Science Corporation Advisory TSA-053
http://www.securescience.net
e-response@securescience.net
877-570-0455

---------------------------------------------------------

Ureach.com's Uscreen Desktop software is vulnerable to misuse and enables
specific caller-id spoofing via the forward feature, enabling compromise
of other communication services operating on PSTN or wireless networks.

---------------------------------------------------------------------

Vulnerability Classification: Authentication bypass, Remote Compromise,
General misuse.

Discovery Date: October 19th, 2004
Vendor Contacted: October 27, 2004
Advisory publication date: November 5th, 2004


Vendor Description:
-------------------
uReach.com strives to provide solutions that meet a wide range of customer needs
from point solutions that address a specific need to robust bundles that can
simplify managing all forms of communications - email, voice mail, fax,
reminders, alerts and phone calls.


Abstract:
---------
Ureach.com's Uscreen Desktop is included in many services that Ureach.com
provides. It is used as a desktop alert and control service, enabling users to
identify the caller, forward the calls to arbitrary numbers, send to voicemail,
and call back missed calls. Ureach.com provides 1-800 virtual numbers to their
customers that will forward to numbers selected by the customer. Example Case:
Many VOIP phone networks allow the use of toll-free calling (18xxx) (such as
freeworld dialup and sipphone.com) and provide you with a sip id or number.
In most cases, the sip id is not the same format as the Caller-Id given on
a PSTN network (usually 7 or 10 digit sets), e.g. freeworld provides 5 or 6 digit
numbers instead. When calling a ureach number with a sip-phone that does
not match the criteria of proper caller id format, Ureach will correct it
by calling the destination number using the Caller-id display of the
destination number.

Description:
------------
In Pseudocode:
if (UscreenReceiveCall(!PROPERCIDFORMAT)) { cid = destination_target; ForwardCall(cid, destination_target); }

By sending a non-proper formatted id as identification, the target number is
displayed as the caller. This allows for trivial abuse by arbitrary attackers,
including remote compromise of voicemail systems such as T-mobile Wireless and
Verizon Northwest (refer to Secure Science Corporation Advisory TSA-051).

Tested Vendors:
---------------
Ureach.com


Vendor and Patch Information:
-----------------------------
Secure Science Corporation has made attempts to contact the vendor and has received no response.

Solution:
---------
Ureach.com receives calls with Caller ID signal first, ANI second (if
Caller-ID is blocked): If the Caller-ID does not match proper format, then ANI
should be utilized or the customers 877 virtual number should be displayed to the destination.

Credits:
--------
Secure Science Corporation: Lance James

Disclaimer:
-----------
Secure Science Corporation is not responsible for the misuse of any of the
information we provide on this website and/or through our security advisories.
Our advisories are a service to our customers intended to promote secure
installation and use of Secure Science Corporation products.
--------------050908050904050106040702--
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close