According to warnings issued by Research in Motion (RIM), hackers can use booby-trapped PDF attachments sent to BlackBerry devices to launch malicious code execution attacks. The company shipped patches this week to address a pair of critical vulnerabilities affecting their product.
The vulnerabilities are due to the improper processing of PDF files within the Distiller component of the BlackBerry Attachment Service.
Multiple security vulnerabilities exist in the PDF distiller of some released versions of the BlackBerry Attachment Service. These vulnerabilities could enable a malicious individual to send an email message containing a specially crafted PDF file, which when opened for viewing on a BlackBerry smartphone, could cause memory corruption and possibly lead to arbitrary code execution on the computer that hosts the BlackBerry Attachment Service.
RIM recommends that users upgrade to the latest version of the BlackBerry Unite! software. RIM customers are strongly urged to apply the updates or implement the workarounds listed in KB17118 and KB17119 documents to help mitigate the risk.
The vulnerabilities are due to the improper processing of PDF files within the Distiller component of the BlackBerry Attachment Service.
Multiple security vulnerabilities exist in the PDF distiller of some released versions of the BlackBerry Attachment Service. These vulnerabilities could enable a malicious individual to send an email message containing a specially crafted PDF file, which when opened for viewing on a BlackBerry smartphone, could cause memory corruption and possibly lead to arbitrary code execution on the computer that hosts the BlackBerry Attachment Service.
RIM recommends that users upgrade to the latest version of the BlackBerry Unite! software. RIM customers are strongly urged to apply the updates or implement the workarounds listed in KB17118 and KB17119 documents to help mitigate the risk.
No comments:
Post a Comment