TUCoPS :: Web :: Servers :: wap2~1.htm

WAP gateways
Vulnerability

    WAP

Affected

    WAP gateways

Description

    'Gus' found following.  In a browser environment, when you connect
    to an site  using SSL/TLS your  browser automatically checks  that
    the  domain  part  of  the  URL  matches  the  domain in the X.509
    certificate that the HTTPS server presents when you connect to it.

    Since  SSL  certificates  are  tamper-evident as the cryptographic
    signature is checked against the "root" certificates of the  large
    CAs  (Thawte,  Verisign,  Global  Trust  etc.)  this  check  gives
    assurance  that  the  requesting  party  is connected to the right
    host - i.e. you are safe from a man-in-the-middle attack.

    It appears that most WAP gateways do not carry out this check,  or
    if they do, no information about mismatches is passed back to  the
    handset.  In limited testing 3 of the 4 gateways used by UK mobile
    operators are vulnerable.  Given this ratio one would expect  this
    to be a global issue.

    A browser-based testing tool for this issue is available at

        http://wap.z-y-g-o.com/

    along with other wireless security information.

Solution

    CMG is aware of the problem  and will be issuing a patch  with the
    next upgrade. (Vodafone UK)

    Openwave (Phone.com) is shipped  vulnerable by default but  can be
    fixed   by   configuration   interface.   (one2one,   Virgin   UK,
    BTCellnet/Genie)

    Nokia on HP/UX is not vulnerable. (Orange UK, Cingular USA)

    Sprint PCS's WAP gateway does  not give a detailed error  message,
    but does not allow the  connection if the root certificate  is not
    a trusted root CA.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH