Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!


TUCoPS :: Phreaking Cellular - Major Manufacturers :: va2123.htm

HTC Touch vCard over IP Denial of Service



HTC Touch vCard over IP Denial of Service
HTC Touch vCard over IP Denial of Service



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Security Advisory

MSL-2008-002 - HTC Touch vCard over IP Denial of Service



Advisory Information
- --------------------
Title:			
HTC Touch vCard over IP Denial of Service

Advisory ID:		
MSL-2008-002

Advisory URL:
http://www.mseclab.com/index.php?page_id=110 

Published:
2008-12-19

Updated:
2008-12-19

Vendor:
HTC

Platforms:
Touch Pro, Touch Cruise


Vulnerability Details
- ---------------------
Class:
Denial of Service

Remote:
Yes

Local:
No

Public References:
Not Assigned

Affected:
HTC Touch Pro, HTC Touch Cruiser

Not Affected:
Currently Unknown

Description:
UDP/9204 port is open and reachable both via WiFi and GPRS/UMTS
connection when the device is capable of sending and receiving SMS.
Port is always open on the Touch Pro, while on Touch Cruiser the port is
open when the SMS application is running.

UDP/9204 is associated with the service WAP-vCard and is used for
sending vCard files to the device, that are displayed as normal SMS to
users.
By flooding the device with multiple vCards it is possible to perform a
Denial of Service attack that  affects usability, SMS handling and
connectivity.
By sending large number of vCards an attacker can achieve significant
device slowdown, making  the UI sluggish and hard to use.
In some cases WiFi connections may be dropped (when vCards are sent via
WiFi), effectively disconnecting the device from the network.

On Touch Cruiser devices, SMS inbox can be completely filled by sending
more then 450 large vCards (size 32K).
The device will not be able to receive SMS anymore or to access the
message stored inside the device until SMS deletion occurs.
Additionally, when large vCards are sent, no acoustic notification (ring
tones) will be played upon incoming messages,  making the attack more
silent and less noticeable by an user.

Battery removal may be needed, in some cases, for restoring normal
functionalities.
Manual deletion of all received SMS requires a very long time, making
the deletion of all the SMS the most viable option, but leading to loss
of all received SMS and requiring in any case a large amount of time
(even hours).
The faster option for restoring the device is performing a hard reset of
the device, leading to the loss of all the content saved on the handset.

The attack can be easily carried in all the scenarios where the device
IP stack is accessible to an attacker, such as Wireless LANs and Mobile
Networks assigning public IP addresses without any firewall protection.
Solutions & Workaround:
A personal firewall solution can be used for denying unwanted access to
the port, effectively avoiding possible attacks.


Additional Information
- ----------------------

Timeline:
2008-12-03:	Issue discovery
2008-12-05:	Initial Vendor Notification: Point of Contact requested via
contact form on website (No suitable e-mail available)
2008-12-14:	Vendor Response: Customer support answered without providing
any suitable contact for vulnerability communication
2008-12-19:	Public Disclosure

Vendor Statement:
None

- --

Mobile Security Lab

Website: www.mseclab.com  

GPG Key Fingerprint
3CEC 8BFA 90C0 E620 B48C 2645 9C8C 642D A501 073F

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org 

iD8DBQFJS7xTnIxkLaUBBz8RAuGRAJ9JWdbDH0/gFlHN7u9mcCBywalt0wCeP0eE
vlUaatlfC6NduuP7VlnkljM=xeLv
-----END PGP SIGNATURE-----


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH