what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

SEC Consult - Symbian S60 / Nokia CODECs

SEC Consult - Symbian S60 / Nokia CODECs
Posted Jul 7, 2009
Authored by Bernhard Mueller | Site sec-consult.com

SEC Consult Security Advisory 20090707-0 - Multiple memory corruption vulnerabilities have been identified in multimedia codecs used by the RealPlayer and MMS viewer on Nokia's Symbian/S60 based smartphones. An attacker could leverage these bugs to gain control of the program counter register and execute arbitrary code on a target smartphone. The bugs can be triggered directly inside the MMS viewer of the target, by sending an MMS with an embedded video file.

tags | advisory, arbitrary, vulnerability
SHA-256 | aeaa346858f3d297167128f3741765a3b8de649f8ac8e79ef104a8614c5c1bc6

SEC Consult - Symbian S60 / Nokia CODECs

Change Mirror Download
SEC Consult Security Advisory < 20090707-0 >
==========================================================================
title: Symbian S60 / Nokia firmware media codecs
multiple memory corruption vulnerabilities
vulnerable version: All Nokia smartphones with multimedia capabilities
are likely vulnerable (tested on E61, E71, N96)
impact: Critical
homepage: http://www.nokia.com/
found: May 2009
by: Bernhard Mueller / SEC Consult Vulnerability Lab
==========================================================================


Vulnerability overview:
-----------------------

Multiple memory corruption vulnerabilities have been identified in
multimedia codecs used by the RealPlayer and MMS viewer on Nokia's
Symbian/S60 based smartphones. An attacker could leverage these bugs to
gain control of the program counter register and execute arbitrary code
on a target smartphone. The bugs can be triggered directly inside the
MMS viewer of the target, by sending an MMS with an embedded video file.


Vulnerability description:
--------------------------

This advisory describes multiple bugs found within several libraries:

* rarender.dll
* STH264HWDecHwDevice.dll
* clntcore.dll
* HxMmfCtrl.dll
* mdfh264payloadformat.dll
* MMFDevSound.dll
* ArmRV89Codec.dll

The effects that can be triggered with manipulated video files range
fromuser panic exceptions to exploitable data abort conditions that can
be used to indirectly influence function pointers and gain control of
the exploited process. A more detailed analysis, as well as the testing
approach used to identifiy the vulnerabilities, can be found in the
whitepaper "From 0 to 0day in Symbian" available at:

https://www.sec-consult.com/files/Pwning_Nokia_V1.03_PUB.pdf


Proof of concept:
-----------------

SEC Consult will not release a full proof of concept exploit to the
public.


Vulnerable versions:
--------------------

All Nokia / Symbian S60 smartphones with RealPlayer are likely
vulnerable. The test and debugging subject was a Nokia N96 smartphone
with firmware version 11.018. The resulting files were also sent to a
Nokia E61i and a Nokia E71 and crashed either the MMS application or the
operating system.


Vendor contact timeline:
------------------------

2008-06-13: Full fuzzing results sent to Nokia
2009-06-30: Whitepaper sent to Nokia
2009-07-06: Limited public release


Patch:
------

No patch is available at the time of this writing.


Workaround:
-----------

>From an end user perspective, security best practices should be applied
that are similar to those required on desktop PCs. The following list
contains some of the most important guidelines:
.
* Perform regular software updates
* Do not install unnecessary applications and services
* Use Anti Virus software
* Take care when browsing the web
* Do not open SMS, MMS or emails from unknown sources25

--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SEC Consult Unternehmensberatung GmbH

Office Vienna
Mooslackengasse 17
A-1190 Vienna
Austria

Tel.: +43 / 1 / 890 30 43 - 0
Fax.: +43 / 1 / 890 30 43 - 25
Mail: research at sec-consult dot com
www.sec-consult.com

EOF Bernhard Mueller / @2009
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close