Threat Descriptons



Category :


Type :


Platform :



Exploit:SymbOS/SMSCurse.A is a Denial-of-Service (DoS) exploit that affects messaging components of phones that use Symbian Series 60 versions 2.6, 2.8, 3.0, 3.1, and Sony Ericsson UiQ devices.


A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

When the exploit crashes SMS messaging on a phone, the phone remains otherwise completely functional. The only effect is that it cannot receive any new SMS/MMS messages.

Exploit:SymbOS/SMSCurse.A affects Series 60 (S60) phones running:

  • S60 2nd Edition, Feature Pack 2
  • S60 2nd Edition, Feature Pack 3
  • S60 3rd Edition (initial release)
  • S60 3rd Edition, Feature Pack 1

These versions of Series 60 contain an SMS vulnerability that can be exploited. SMSCurse.A is a specifically formatted SMS message that will crash the SMS messaging service of vulnerable phones.

Only one exploit message will crash the messaging service of S60 2nd Edition, Feature Pack 2 and S60 3rd Edition (initial release) phones.

Several messages are required to crash the messaging service of S60 2nd Edition, Feature Pack 3 and S60 3rd Edition, Feature Pack1 phones.

Phones that can be DoS with only one exploit message present no evidence of attack.

Phones that require several messages produce the following error once the service is jammed:

  • Not enough memory to receive message(s). Delete some data first.

The main display phone will repeatedly flash a message icon. The user will not receive any new messages. Restarting these phones will restore limited, but fragile functionality. One new SMS message may be received before the service crashes again. A multi-part SMS message may crash the service to the point that a restart of the phone fails to restore any functionality.

Backing up the phone will also back up the exploit messages and will not repair the exploit.

Devices that use Symbian OS 9.3 are not affected. S60 3rd Edition, Feature Pack 2 and S60 5th Edition phones are not vulnerable.

More Support


Ask questions in our Community .

User Guides

Check the user guide for instructions.

Contact Support

Chat with or call an expert.

Submit a Sample

Submit a file or URL for analysis.