CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
May 28th, 2009

Researchers Warn BlackBerry Users Over Malformed PDF Vulnerability

Research In Motion (RIM) has warned of a vulnerability in how BlackBerry servers handle malformed PDF files that potentially leaves the door open to hacking attacks.

If corporate users of BlackBerry mobile devices are tricked into opening an email message with a booby-trapped PDF attachment, it might be possible to inject hostile code onto a vulnerable server running the BlackBerry Attachment Service, RIM warns.

BlackBerry Enterprise Server software version 4.1 Service Pack 3 (4.1.3) through 5.0 and BlackBerry Professional Software 4.1 Service Pack 4 (4.1.4) are affected. RIM has issued an an interim security software update as explained in an advisory which can be found at www.blackberry.com.

The Canadian firm is also advising customers to disable PDF file processing on the BlackBerry server, as a workaround, pending the application of a more complete fix.

The incident is far from unprecedented, but it underlines the threat unpatched PDF and Microsoft Office applications increasingly pose to corporate security, beyond the better-known threats posed by unpatched browser applications.

Credit: The Register

Share this item with others:

More on CyberInsecure:
  • Critical PDF Processing Vulnerability In BlackBerry Enterprise Server
  • PDF Processing Vulnerabilities Patched In BlackBerry
  • Blackberry Spyware Source Code, TXSBBspy, Released By Veracode
  • ActiveX Control Flaw In BlackBerry Leads To Code Execution Attacks
  • Confirmed Zero-day Flash Vulnerability In Latest Adobe Reader And Acrobat 9.1.2, Adobe Flash Player 9 And 10

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: Researchers Warn BlackBerry Users Over Malformed PDF Vulnerability

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.