ID CVE-2016-7991
Summary On Samsung Galaxy S4 through S7 devices, the "omacp" app ignores security information embedded in the OMACP messages resulting in remote unsolicited WAP Push SMS messages being accepted, parsed, and handled by the device, leading to unauthorized configuration changes, a subset of SVE-2016-6542.
References
Vulnerable Configurations
  • cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
  • cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*
    cpe:2.3:h:samsung:galaxy_s4:-:*:*:*:*:*:*:*
  • cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*
    cpe:2.3:h:samsung:galaxy_s4_mini:-:*:*:*:*:*:*:*
  • cpe:2.3:h:samsung:galaxy_s5:-:*:*:*:*:*:*:*
    cpe:2.3:h:samsung:galaxy_s5:-:*:*:*:*:*:*:*
  • cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*
    cpe:2.3:h:samsung:galaxy_s6:-:*:*:*:*:*:*:*
  • cpe:2.3:h:samsung:galaxy_s7:-:*:*:*:*:*:*:*
    cpe:2.3:h:samsung:galaxy_s7:-:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 02-12-2016 - 23:37)
Impact:
Exploitability:
CWE CWE-388
CAPEC
  • Fuzzing for garnering J2EE/.NET-based stack traces, for application mapping
    An attacker sends random, malformed, or otherwise unexpected messages to a target application and observes any stack traces produced by error messages. Fuzzing techniques involve sending random or malformed messages to a target and monitoring the target's response. The attacker does not initially know how a target will respond to individual messages but by attempting a large number of message variants they may find a variant that trigger's desired behavior. In this attack, the purpose of the fuzzing is to cause the targeted application to return an error including a stack trace, although fuzzing a target can also sometimes cause the target to enter an unstable state, causing a crash. The stack trace enumerates the chain of methods that led up to the point where the error was encountered. This can not only reveal the names of the methods (some of which may have known weaknesses) but possibly also the location of class files and libraries as well as parameter values. In some cases, the stack trace might even disclose sensitive configuration or user information.
  • Fuzzing
    In this attack pattern, the adversary leverages fuzzing to try to identify weaknesses in the system. Fuzzing is a software security and functionality testing method that feeds randomly constructed input to the system and looks for an indication that a failure in response to that input has occurred. Fuzzing treats the system as a black box and is totally free from any preconceptions or assumptions about the system. Fuzzing can help an attacker discover certain assumptions made about user input in the system. Fuzzing gives an attacker a quick way of potentially uncovering some of these assumptions despite not necessarily knowing anything about the internals of the system. These assumptions can then be turned against the system by specially crafting user input that may allow an attacker to achieve his goals.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE COMPLETE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:C/A:N
refmap via4
bid 94088
confirm http://security.samsungmobile.com/smrupdate.html#SMR-AUG-2016
Last major update 02-12-2016 - 23:37
Published 31-10-2016 - 10:59
Last modified 02-12-2016 - 23:37
Back to Top