SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Other)  >   Blackberry OS Vendors:   Research In Motion Limited
Blackberry OS WML Link Processing Lets Remote Users Temporarily Deny Service
SecurityTracker Alert ID:  1017748
SecurityTracker URL:  http://securitytracker.com/id/1017748
CVE Reference:   CVE-2007-1441   (Links to External Site)
Updated:  Mar 14 2007
Original Entry Date:  Mar 13 2007
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): BlackBerry 8100 (firmware v4.2.0.51)
Description:   A vulnerability was reported in Blackberry OS. A remote user can cause denial of service conditions.

A remote user can create a WML page that contains a specially crafted string value within a link. When the page is loaded, the browser will enter a temporary denial of service state, causing the device to become temporarily unavailable.

The vulnerability resides in the 4thPass browser.

The BlackBerry Pearl 8100 model is affected.

Michael Kemp discovered this vulnerability.

Impact:   A remote user can cause denial of service conditions.
Solution:   The vendor has issued a fixed version (firmware version 4.2.1).

[Editor's note: At the time of this entry, the vendor's web site did not yet reference this vulnerability.]

Vendor URL:  www.blackberry.com/ (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents

Subject:  RIM BlackBerry Pearl 8100 Browser DoS

RIM BlackBerry Pearl 8100 Browser DoS
------

12 March 2007

Summary:
A vulnerability has been discovered that could impact upon the availability of the BlackBerry 8100 Wireless handheld (v4.2.0.51).
 It is possible for a remote attacker to construct a WML page that contains an overly long string value within a link (e.g.: <a href
 = "aaaaaaaaaaaaaaaaaaa etc.>). Should the page or link be accessed by BlackBerry devices, this leads to a temporary Denial of Service
 within the 4thPass browser component on the device, and temporary device inoperability. Normal functionality will be returned to
 the browser / device after an amount of time relative to the size of the link supplied, or by physically removing and reinserting
 the battery thereby creating a reset.

Business Impact:
Exploitation of this issue can lead to a loss of device functionality.  

Affected Product(s):
The BlackBerry 8100 (Pearl) handheld device (v4.2.0.51)

Remediation:
Upgrade to vendor patch 4.2.1

Additional details of this vulnerability are available from the vendor at www.blackberry.com/security/news.jsp

Credit:
Michael Kemp (www.clappymonkey.com)

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC