For the second time in as many weeks, Research In Motion Ltd. (RIM) is acknowledging that its BlackBerry Enterprise Server is vulnerable to attack.
This time, the problem
Continue Reading This Article
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
The vulnerability has been reported in version 4.0 Service Pack 2.
For those using Microsoft Exchange, the Waterloo, Ontario-based vendor recommended installing BlackBerry Enterprise Server 4.0 Service Pack 3, then installing version 4.0 Service Pack 3, Hotfix 1. IBM Lotus Domino and Novell GroupWise users should install BlackBerry Enterprise Server 4.0 Service Pack 3, the company said.
As a workaround, administrators "can exclude PNG images from being processed by the attachment service in the BlackBerry Enterprise Server, or disable the attachment service completely," the vendor said.
Last week, RIM acknowledged that attackers could exploit flaws in BlackBerry Enterprise Server to cause a denial of service. Danish vulnerability clearinghouse Secunia issued its own advisory describing two problems:
- An error in how malformed TIFF image attachments are handled can be exploited to prevent a BlackBerry user from viewing attachments.
- An error in how Server Routing Protocol (SRP) packets are handled can be exploited to disrupt the communication between the BlackBerry Enterprise Server and BlackBerry Router service, potentially causing a denial of service.
Secunia noted that for successful exploitation, the attacker must connect to the BlackBerry Server/Router via TCP port 3101.
As a workaround, RIM recommended ensuring TIFF images aren't processed by the attachment service and/or disabling the image attachment distiller. The vendor added that the BlackBerry Enterprise Server and the BlackBerry Router should be placed behind the firewall in a trusted network segment.