[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4178F686.5040709@man.poznan.pl>
From: zupa at man.poznan.pl (Adam Gowdiak)
Subject: J2ME security vulnerabilities
Hello all,
Since I received information from SUN Microsystems that they did not
plan to release
Sun Alert for the issues I found in their CLDC [1] reference
implementation, I would
like to announce the following.
I found two very serious security vulnerabilities in Java technology for
mobile
devices (Java 2 Micro Edition) that might be affecting about 250
millions [2] of
mobile phones coming from Nokia, Siemens, Panasonic, Samsung, Motorola
and others
[3]. Information about these flaws has been published at Hack In the Box
Security
Conference [4] earlier this month in Kuala Lumpur, Malaysia.
Both vulnerabilities are implementation flaws in bytecode verifier
component of
KVM (Java Virtual Machine for mobile devices) developed by SUN
Microsystems. Each
of the flaws can be used to completely break Java security (Java type
and memory
safety) on a mobile device and to obtain access to the phone data and
underlying
operating system's functionality.
I verified on my Nokia DCT4 phone that malicious code exploiting one of
the flaws
can steal data from the phone (i.e. phonebook, SMS messages), establish
communication
with the Internet, send arbitrary SMS messages, write permanent memory
of the phone
(FLASH), interfere with or intercept IPC communication occuring between
native Nokia
OS tasks, install resident code on the phone. Any of the aforementioned
actions can
be conducted without user knowledge and permission.
I would like to emphasize that although escaping the KVM sandbox and
breaking Java
type and memory safety is almost straightforward, conducting malicious
actions on
a given device is rather difficult as it usually requires deep knowledge
about the
internal operation of the underlying OS (I spent four months reverse
engineering
Nokia OS before I could do anything malicious from Java appplication on
my phone).
I plan to release a research paper with all the details about the flaws
including
device specific information and some additional material that didn?t fit
into my
HITB talk, in a couple of months (1Q 2005).
Best Regards
Adam Gowdiak
Security Team of
POZNAN SUPERCOMPUTING AND NETWORKING CENTER
http://www.man.poznan.pl
[1] http://java.sun.com/products/cldc/
[2] http://media.corporate-ir.net/media_files/NYS/NOK/Beijing/mestaranta.pdf
[3] http://jal.sun.com/webapps/device/device
[4] http://conference.hackinthebox.org
Powered by blists - more mailing lists