exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Nokia Denial Of Service / Spoofing

Nokia Denial Of Service / Spoofing
Posted Jun 19, 2009
Authored by Collin Mulliner

The Nokia 6212 Classic suffers from denial of service and URL spoofing vulnerabilities.

tags | advisory, denial of service, spoof, vulnerability
SHA-256 | f924130f46c774dfe95a5814310493331cfaa964f415837fbb22a8db6ce22bd6

Nokia Denial Of Service / Spoofing

Change Mirror Download
Vulnerability Report

--- BEGIN ADVISORY ---

Manufacturer: Nokia (www.nokia.com)
Device: Nokia 6212 Classic
Firmware: V 05.16, 29-09-08, RM-396
Device Type: mobile phone
OS: Nokia Series40

Subsystem: Near Field Communication

-----------------------------

Executive Summary:
URL Spoofing when displaying the content of a NDEF
URI tag. Web browser does not display full hostname when
loading a web page.

Crash of the parser for parts of a NDEF record, reboots
graphical user interface (GUI) of phone.

-----------------------------

Reporter: Collin Mulliner <collin[AT]mulliner.org>

-----------------------------

Affiliation: MUlliNER.ORG / the trifinite group

-----------------------------

Time line:

Presented at 25C3 : 29. December 2008
Reported to vendor : 01. January 2009
Received ack. : 05. January 2009
Published to mailing lists : 18. June 2009

-----------------------------

Brief Technical Details:

The Nokia 6212 Classic mobile phone is a mobile phone featuring the
Near Field Communication (NFC) technology (http://www.nfc-forum.org).
The phone has multiple security vulnerabilities in the code that parses
and displays the content of a NDEF tags and plain URI tags.

1) URI Spoofing (using plain URI tags)

Long URLs are short end by removing the end of the URL replacing it
with "..." (3 dots). This behavior can be abused for spoofing the
URL that is displayed to the user. This way an attacker can trick
a user into loading a malicious website. Also the phone does not
display the URL of the website (URL can be looked up through a menu
option).

Spoofing works using the classic @ method. Certain characters are
not allowed before the @ such as: /

Example:
http://www.example.com......@mulliner.org:6666

Will be displayed as: http://www.example.com....


2) NDEF Record Parser Crash

The NDEF Record parser crashes if the record payload length field
contains either 0xFFFFFFFF or 0xFFFFFFFE

The crash will reboot the GUI of the phone. After 4 reboots in a row
the phone will switch off completely (e.g. user constantly trying to
read the tag containing this value).

-----------------------------

More Detailed Information:

More details, slides and tools are available here:
http://www.mulliner.org/nfc/

Security Advisories:
http://mulliner.org/security/advisories/

--- END ADVISORY ---

--
Collin R. Mulliner <collin@betaversion.net>
info/pgp: finger collin@betaversion.net
I'm a .signature virus. Copy me to help me spread.
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close