Blackberry OS WML Link Processing Lets Remote Users Temporarily Deny Service
|
|
SecurityTracker Alert ID: 1017748 |
|
SecurityTracker URL: http://securitytracker.com/id/1017748
|
|
CVE Reference:
CVE-2007-1441
(Links to External Site)
|
Updated: Mar 14 2007
|
Original Entry Date: Mar 13 2007
|
Impact:
Denial of service via network
|
Fix Available: Yes Vendor Confirmed: Yes Exploit Included: Yes
|
Version(s): BlackBerry 8100 (firmware v4.2.0.51)
|
Description:
A vulnerability was reported in Blackberry OS. A remote user can cause denial of service conditions.
A remote user can create a WML page that contains a specially crafted string value within a link. When the page is loaded, the browser will enter a temporary denial of service state, causing the device to become temporarily unavailable.
The vulnerability resides in the 4thPass browser.
The BlackBerry Pearl 8100 model is affected.
Michael Kemp discovered this vulnerability.
|
Impact:
A remote user can cause denial of service conditions.
|
Solution:
The vendor has issued a fixed version (firmware version 4.2.1).
[Editor's note: At the time of this entry, the vendor's web site did not yet reference this vulnerability.]
|
Vendor URL: www.blackberry.com/ (Links to External Site)
|
Cause:
Input validation error
|
|
Message History:
None.
|
Source Message Contents
|
Subject: RIM BlackBerry Pearl 8100 Browser DoS
|
RIM BlackBerry Pearl 8100 Browser DoS
------
12 March 2007
Summary:
A vulnerability has been discovered that could impact upon the availability of the BlackBerry 8100 Wireless handheld (v4.2.0.51).
It is possible for a remote attacker to construct a WML page that contains an overly long string value within a link (e.g.: <a href
= "aaaaaaaaaaaaaaaaaaa etc.>). Should the page or link be accessed by BlackBerry devices, this leads to a temporary Denial of Service
within the 4thPass browser component on the device, and temporary device inoperability. Normal functionality will be returned to
the browser / device after an amount of time relative to the size of the link supplied, or by physically removing and reinserting
the battery thereby creating a reset.
Business Impact:
Exploitation of this issue can lead to a loss of device functionality.
Affected Product(s):
The BlackBerry 8100 (Pearl) handheld device (v4.2.0.51)
Remediation:
Upgrade to vendor patch 4.2.1
Additional details of this vulnerability are available from the vendor at www.blackberry.com/security/news.jsp
Credit:
Michael Kemp (www.clappymonkey.com)
|
|