Government Security
Network Security Resources

Jump to content

Photo

Palm Pre Webos Version <= 1.1 Floating Point Exception

security bug vulnerability patch
  • Please log in to reply
No replies to this topic

#1 qcred11

qcred11

    First Sergeant

  • Members
  • 2,544 posts

Posted 09 November 2009 - 11:56 PM


I.  Description 



The Palm Pre WebOS version <= 1.1 suffers from a floating point exception vulnerability when 

attempting to view a specially crafted web page. This vulnerability has been addressed in the latest 

patch from Palm and all users are recommended to update to WebOS version 1.2+. 



II.  Impact 



If a user views a malicious web page that contains specially crafted data, the "LunaSysMgr" process 

will crash, causing the device to simulate a reboot.  The bug itself is a floating point exception 

that crashes the "LunaSysMgr" process and forces the device to restart the process, simulating a 

reboot of the system.  At the time of the discovery, the greatest risk to the system was a denial of 

service condition. 



The crash does not occur when viewing the malicious web page while in landscape mode. 



III. Proof of Concept 



The Palm Pre WebOS version <= 1.1 will crash upon opening a web page that contains 50,280 bytes of 

data or greater and attempts to refresh the page.  Upon viewing the malicious web page the 

LunaSysMgr process will generate a floating point exception and simulate a system "reboot". 



The following code will trigger the issue 



"<meta http-equiv="refresh" content="1">AAAAA..." using 50280 or more characters after the refresh. 



IV. About 



This vulnerability was discovered by Townsend Ladd Harris <PalmPreHacker [a t] gmail.com> 



Vulnerability details will be posted at: 

http://tlhsecurity.blogspot.com/2009/10/palm-pre-webos-version-11-floating.html







Also tagged with one or more of these keywords: security, bug, vulnerability, patch