New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 1532 link

Starred by 4 users

Issue metadata

Status: Fixed
Last visit > 30 days ago
Closed: May 2018

Sign in to add a comment

Samsung Galaxy S7 Edge: Overflow in OMACP WbXml String Extension Processing

Project Member Reported by, Feb 21 2018

Issue description

OMACP is a protocol supported by many mobile devices which allows them to receive provisioning information over the mobile network. One way to provision a device is via a WAP push SMS message containing provisioning information in WbXML.

A malformed OMACP WAP push message can cause memory corruption on a Samsung S7 Edge device when processing the String Extension portion of the WbXml payload. This is due to an integer overflow in memory allocation for this string.

While OMACP WAP pushes require authentication, the entire WbXml payload of a push is parsed to extract the credentials, so this bug occurs pre-authentication.

To reproduce the issue:

1) install the attached Android application on a different phone than the one being tested for the issue
2) manually give the application SMS permissions in the settings screen
3) start the app and enter the phone number on the target device
4) press the "send wap push" button

The target phone will crash:

02-20 15:52:56.952 15197 15197 F DEBUG   : pid: 15180, tid: 15196, name: IntentService[S  >>> com.wsomacp <<<
02-20 15:52:56.952 15197 15197 F DEBUG   : signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x731a800000

The WAP payload causing this problem is:


Code for the test app is also attached.

This was tested on Samsung build number NRD90M.G93FXXU1DQJ8, which is the most recent update on my device

This bug is subject to a 90 day disclosure deadline. After 90 days elapse
or a patch has been made broadly available, the bug report will become
visible to the public.

1.8 MB Download
16.4 MB Download
Project Member

Comment 1 by, Feb 21 2018

I am having difficulty reporting this issue, as Samsung's vulnerability reporting page ( requires agreeing to a number of legal agreements, including some that are in Korean only and some that include language about disclosure. I have reached out to some contacts at Samsung to figure out how to report these issues without these agreements.
Project Member

Comment 2 by, Feb 21 2018

Labels: -Reported-2017-02-20 Reported-2018-Feb-20
Project Member

Comment 3 by, Feb 22 2018

Labels: -Reported-2018-Feb-20 Reported-2018-Feb-21
I heard back and reported it. 
Project Member

Comment 4 by, May 4 2018

Labels: CVE-2018-10751
Project Member

Comment 5 by, May 22 2018

Labels: -Restrict-View-Commit
Status: Fixed (was: New)
This was fixed in Samsung's April update:

Comment 6 by, May 26 2018

Hi, does this work on Galaxy S7?

05-26 11:37:00.381 14133 14133 F DEBUG   : pid: 14110, tid: 14126, name: IntentService[S  >>> com.wsomacp <<<
05-26 11:37:00.381 14133 14133 F DEBUG   : signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x791d800000

This log is from my SM-G930F with latest (NRD90M.G930FXXS2DRC3) firmware.

Sign in to add a comment