ID

VAR-201101-0123


CVE

CVE-2010-2599


TITLE

BlackBerry Device Software Denial of service in Japan (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2011-001299

DESCRIPTION

Unspecified vulnerability in Research In Motion (RIM) BlackBerry Device Software before 6.0.0 allows remote attackers to cause a denial of service (browser hang) via a crafted web page. Successful exploits allow an attacker to crash the affected browser, resulting in a denial-of-service condition. Versions prior to Research In Motion BlackBerry Device Software 6.0.0 are vulnerable. Gents, BlackHat Washington DC has just finished, and we wanted to let you know that RIM officially released a patch for the vulnerability found by TEHTRI-Security in BlackBerry devices, and covered during our talk: "Inglourious Hackerds: Targeting Web Clients". To quote RIM web site, the BlackBerry device subsequently terminates the browser, and the browser eventually restarts and displays an error message. What was quite funny is that, with little tweaks (based on incoming User-Agent + sizes of buffers + payloads...) our 0day also worked against HTC Windows, Apple iPhone/iPod (CVE-2010-1752) and Google Android devices, with different kind of results. It's all related to a flaw in the way those devices try to handle HTML codes, based on some concepts taken from the HTTP RFC directly... To avoid the spread of annoying exploits, that would target customers of Google, RIM, Apple & HTC, we only shared some information with the vendors and during the BlackHat DC event, but our slides on BlackHat.com will also contain part of information. If you want to go further, here are some useful links: - Official RIM web page dealing with our 0Day: http://www.blackberry.com/btsc/KB24841 - BlackHat Washington DC: https://www.blackhat.com/html/bh-dc-11/bh-dc-11-schedule.html - Mitre CVE Entry http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2599 - Gartner.com Blog Entry about our talk @BHDC: http://blogs.gartner.com/john_pescatore/2011/01/20/if-a-toy-breaks-in-a-work-forest-will-the-toy-vendor-hear-a-noise-and-fix-it/ - NetworkWorld Press Article about our talk @BHDC: http://www.networkworld.com/news/2011/012011-retaliation-answer-cyber-attacks.html - TEHTRI-Security Blog: http://blog.tehtri-security.com/2011/01/blackhat-dc-2011-inglourious-hackerds.html We would like to thanks the security experts of RIM who came to our talk in Washington, and who took time there to share explanations with our attendees in order to show how they mitigated our findings by handling those issues with all the carriers involved worldwide (what an incredible task). On our side, we got technical fun by doing technical penetration tests on those devices, and this is how we found such 0days. We do think that basic tests are not always done properly because of consumerization, money & time issues, etc. Recently, we found 0days against IP Camera surveillance, etc, by doing penetration tests. We live in world where everything has to be clean, beautiful, quick, easy, marketable, and certified. But what about IT Security, while everything gets more and more complex... We now all get Certified non-Ethically Hackable... "Good night, and Good luck." Best regards, Laurent OUDOT, from Washington DC, USA @BlackHatDC Briefings ( http://blackhat.com/html/bh-dc-11/bh-dc-11-briefings.html#Oudot ) TEHTRI-Security - "This is not a Game." http://www.tehtri-security.com/ http://twitter/tehtris . Gents, If you are a lucky BlackBerry owner, or an administrator of many BB devices, you can do a quick security check of your smartphone(s), by browsing this web page from your device (free quick check): http://tehtris.com/bbcheck For now, this will check for you if you are potentially vulnerable against those exploits: -> Nov 2007 - US-CERT Advisory VU#282856 - Exploit from Michael Kemp http://www.blackberry.com/btsc/KB12577 -> Jan 2011 - CVE-2010-2599 - Exploit found by TEHTRI-Security http://www.blackberry.com/btsc/KB24841 -> Mar 2011 - CVE-2011-1290 - Awesome Pwn2own/CSW exploit from Vincenzo Iozzo, Ralf Philipp Weinmann, and Willem Pinckaers A workaround for this latest vulnerability (CVE-2011-1290) could be to disable JavaScript, as explained on RIM resources. You should definitely read this: http://www.blackberry.com/btsc/KB26132 Have a nice day, Laurent OUDOT, CEO TEHTRI-Security -- "This is not a game" http://www.tehtri-security.com/ Follow us: @tehtris => Join us for more hacking tricks during next awesome events: - SyScan Singapore (April) -- Training: "Advanced PHP Hacking" http://www.syscan.org/index.php/sg/training - HITB Amsterdam (May) -- Training: "Hunting Web Attackers" http://conference.hackinthebox.org/hitbsecconf2011ams/?page_id=16

Trust: 2.07

sources: NVD: CVE-2010-2599 // JVNDB: JVNDB-2011-001299 // BID: 45754 // PACKETSTORM: 97744 // PACKETSTORM: 99462

AFFECTED PRODUCTS

vendor:rimmodel:blackberry softwarescope:eqversion:5.0.0.882

Trust: 1.6

vendor:rimmodel:blackberry softwarescope:eqversion:4.0

Trust: 1.6

vendor:rimmodel:blackberry softwarescope:eqversion:4.7.1

Trust: 1.6

vendor:rimmodel:blackberry softwarescope:eqversion:4.6.1

Trust: 1.6

vendor:rimmodel:blackberry softwarescope:eqversion:4.6

Trust: 1.6

vendor:rimmodel:blackberry softwarescope:eqversion:5.0.0.1036

Trust: 1.6

vendor:rimmodel:blackberry softwarescope:eqversion:4.7

Trust: 1.6

vendor:rimmodel:blackberry softwarescope:eqversion:4.5.0

Trust: 1.6

vendor:rimmodel:blackberry softwarescope:eqversion:5.0.0.1041

Trust: 1.6

vendor:rimmodel:blackberry softwarescope:eqversion:5.0.0.593

Trust: 1.0

vendor:rimmodel:blackberry softwarescope:eqversion:5.0.0.983

Trust: 1.0

vendor:rimmodel:blackberry softwarescope:lteversion:5.0.0.1039

Trust: 1.0

vendor:rimmodel:blackberry softwarescope:eqversion:5.0.0.973

Trust: 1.0

vendor:blackberrymodel:device softwarescope:ltversion:6.0.0

Trust: 0.8

vendor:rimmodel:blackberry softwarescope:eqversion:5.0.0.1039

Trust: 0.6

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.7.1.57

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.7.1

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.7.179

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.7

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.6.1.309

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.6.1

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.6.303

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.6

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.5.173

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.5

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.0.2

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.0.1.83

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.0.1.108

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:4.0

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:eqversion:5.0

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:2.0

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:1.0

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:6.0.1

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:6.0

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:5.0.1

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:5.0

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:4.7

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:4.6

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:4.5

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:4.0

Trust: 0.3

vendor:researchmodel:in motion blackberry desktop softwarescope:eqversion:3.0

Trust: 0.3

vendor:researchmodel:in motion blackberry device softwarescope:neversion:6.0

Trust: 0.3

sources: BID: 45754 // JVNDB: JVNDB-2011-001299 // CNNVD: CNNVD-201101-135 // NVD: CVE-2010-2599

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-2599
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-2599
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201101-135
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2010-2599
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2011-001299 // CNNVD: CNNVD-201101-135 // NVD: CVE-2010-2599

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2010-2599

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201101-135

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201101-135

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-001299

PATCH

title:KB24841url:http://www.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB24841

Trust: 0.8

sources: JVNDB: JVNDB-2011-001299

EXTERNAL IDS

db:NVDid:CVE-2010-2599

Trust: 2.9

db:BIDid:45754

Trust: 2.7

db:VUPENid:ADV-2011-0082

Trust: 2.4

db:OSVDBid:70404

Trust: 1.8

db:SECTRACKid:1024952

Trust: 1.8

db:XFid:64622

Trust: 0.8

db:JVNDBid:JVNDB-2011-001299

Trust: 0.8

db:CNNVDid:CNNVD-201101-135

Trust: 0.6

db:PACKETSTORMid:97744

Trust: 0.1

db:PACKETSTORMid:99462

Trust: 0.1

sources: BID: 45754 // JVNDB: JVNDB-2011-001299 // PACKETSTORM: 97744 // PACKETSTORM: 99462 // CNNVD: CNNVD-201101-135 // NVD: CVE-2010-2599

REFERENCES

url:http://www.securityfocus.com/bid/45754

Trust: 2.4

url:http://www.vupen.com/english/advisories/2011/0082

Trust: 2.4

url:http://osvdb.org/70404

Trust: 1.8

url:http://www.securitytracker.com/id?1024952

Trust: 1.8

url:http://www.blackberry.com/btsc/kb24841

Trust: 1.8

url:http://blog.tehtri-security.com/2011/01/blackhat-dc-2011-inglourious-hackerds.html

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/64622

Trust: 1.0

url:http://www.securityfocus.com/archive/1/515860/100/0/threaded

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2599

Trust: 0.9

url:http://xforce.iss.net/xforce/xfdb/64622

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2599

Trust: 0.8

url:http://www.rim.net/

Trust: 0.3

url:http://www.blackberry.com/btsc/search.do?cmd=displaykc&doctype=kc&externalid=kb24841

Trust: 0.3

url:http://www.tehtri-security.com/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2010-2599

Trust: 0.2

url:http://twitter/tehtris

Trust: 0.1

url:https://www.blackhat.com/html/bh-dc-11/bh-dc-11-schedule.html

Trust: 0.1

url:http://blogs.gartner.com/john_pescatore/2011/01/20/if-a-toy-breaks-in-a-work-forest-will-the-toy-vendor-hear-a-noise-and-fix-it/

Trust: 0.1

url:http://blackhat.com/html/bh-dc-11/bh-dc-11-briefings.html#oudot

Trust: 0.1

url:http://www.networkworld.com/news/2011/012011-retaliation-answer-cyber-attacks.html

Trust: 0.1

url:http://www.blackberry.com/btsc/kb12577

Trust: 0.1

url:http://conference.hackinthebox.org/hitbsecconf2011ams/?page_id=16

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-1290

Trust: 0.1

url:http://tehtris.com/bbcheck

Trust: 0.1

url:http://www.syscan.org/index.php/sg/training

Trust: 0.1

url:http://www.blackberry.com/btsc/kb26132

Trust: 0.1

sources: BID: 45754 // JVNDB: JVNDB-2011-001299 // PACKETSTORM: 97744 // PACKETSTORM: 99462 // CNNVD: CNNVD-201101-135 // NVD: CVE-2010-2599

CREDITS

Laurent Oudot of TEHTRI Security

Trust: 0.3

sources: BID: 45754

SOURCES

db:BIDid:45754
db:JVNDBid:JVNDB-2011-001299
db:PACKETSTORMid:97744
db:PACKETSTORMid:99462
db:CNNVDid:CNNVD-201101-135
db:NVDid:CVE-2010-2599

LAST UPDATE DATE

2025-04-11T21:31:37.749000+00:00


SOURCES UPDATE DATE

db:BIDid:45754date:2011-01-11T00:00:00
db:JVNDBid:JVNDB-2011-001299date:2011-03-29T00:00:00
db:CNNVDid:CNNVD-201101-135date:2011-01-13T00:00:00
db:NVDid:CVE-2010-2599date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:BIDid:45754date:2011-01-11T00:00:00
db:JVNDBid:JVNDB-2011-001299date:2011-03-29T00:00:00
db:PACKETSTORMid:97744date:2011-01-21T20:11:01
db:PACKETSTORMid:99462date:2011-03-18T22:39:32
db:CNNVDid:CNNVD-201101-135date:2011-01-13T00:00:00
db:NVDid:CVE-2010-2599date:2011-01-13T01:00:01.350