Exploit:SymbOS/SMSCurse.A is a Denial-of-Service (DoS) exploit that affects messaging components of phones that use Symbian Series 60 versions 2.6, 2.8, 3.0, 3.1, and Sony Ericsson UiQ devices.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest detection database updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
NOTE If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note You need administrative rights to change the settings.
When the exploit crashes SMS messaging on a phone, the phone remains otherwise completely functional. The only effect is that it cannot receive any new SMS/MMS messages.
Exploit:SymbOS/SMSCurse.A affects Series 60 (S60) phones running:
These versions of Series 60 contain an SMS vulnerability that can be exploited. SMSCurse.A is a specifically formatted SMS message that will crash the SMS messaging service of vulnerable phones.
Only one exploit message will crash the messaging service of S60 2nd Edition, Feature Pack 2 and S60 3rd Edition (initial release) phones.
Several messages are required to crash the messaging service of S60 2nd Edition, Feature Pack 3 and S60 3rd Edition, Feature Pack1 phones.
Phones that can be DoS with only one exploit message present no evidence of attack.
Phones that require several messages produce the following error once the service is jammed:
The main display phone will repeatedly flash a message icon. The user will not receive any new messages. Restarting these phones will restore limited, but fragile functionality. One new SMS message may be received before the service crashes again. A multi-part SMS message may crash the service to the point that a restart of the phone fails to restore any functionality.
Backing up the phone will also back up the exploit messages and will not repair the exploit.
Devices that use Symbian OS 9.3 are not affected. S60 3rd Edition, Feature Pack 2 and S60 5th Edition phones are not vulnerable.