RIM Issues BlackBerry Security Advisory
Vulnerabilities in the BlackBerry Application Web Loader ActiveX control could allow an attacker to execute code remotely or cause Microsoft Internet Explorer to crash.
A vulnerability in the BlackBerry Application Web Loader ActiveX control could allow an attacker to execute code remotely or to cause Microsoft Internet Explorer to crash, the company said.
More Personal Tech Insights
- Guide to Social IT Basics
- Government Analytics: Set Goals, Drive Accountability and Improve Outcomes
- Strategy: Smartphone Smackdown: Galaxy Note II vs. Lumia 920 vs. iPhone 5
- Research: 2012 Consumerization of IT Survey
"An exploitable buffer overflow exists in the BlackBerry Application Web Loader ActiveX control that Internet Explorer uses to install applications on BlackBerry devices," RIM explains in its advisory. "When a BlackBerry device user browses to a Web site that is designed to install the BlackBerry Application Web Loader ActiveX control on BlackBerry devices over a USB connection, and clicks 'Yes' to install and run the ActiveX control, the ActiveX control introduces the vulnerability to the computer."
RIM's warning comes in conjunction with a security advisory issued by Microsoft that updates its ActiveX kill bit list to include a kill bit to prevent the BlackBerry Application Web Loader ActiveX control from being exploited.
The vulnerability can be resolved by installing an updated version of the BlackBerry Application Web Loader. The RIM Web site also includes a workaround that describes how to disable the affected ActiveX control.
In its 2008 X-Force Trend and Risk report, released earlier this month, IBM reports that ActiveX controls accounted for 46% of all browser-related vulnerability disclosures in 2008, and 66% of browser-related vulnerabilities designated "critical" or "high."
There was an overall decline in browser-related vulnerability disclosures last year, according to IBM's report.
"Unfortunately, the decline in ActiveX disclosures does not appear to be making an impact on exploitation," the report said. "As with other browser-related vulnerabilities, attackers rely upon users who do not keep their browsers current. Although Microsoft has made great strides in preventing ActiveX exploitation through changes to Microsoft Internet Explorer, exploitation remains an issue along with the continued usage of known vulnerable ActiveX controls from non-malicious Web sites."
InformationWeek has published an independent analysis of what other security measures companies can take for their mobile workforces. Download the report here (registration required).