Vulnerabilities > CVE-2006-0761 - Buffer Overflow vulnerability in BlackBerry Enterprise Server Malformed Word Attachment
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in BlackBerry Attachment Service in Research in Motion (RIM) BlackBerry Enterprise Server 2.2 and 4.0 before SP3 Hotfix 4 for IBM Lotus Domino, 3.6 before SP7 and 5.0 before SP3 Hotfix 3 for Microsoft Exchangem, and 4.0 for Novell GroupWise before SP3 Hotfix 1 might allow user-assisted remote attackers to execute arbitrary code on the server via a crafted Microsoft Word document that is opened on a wireless device.
Vulnerable Configurations
Nessus
NASL family | Gain a shell remotely |
NASL id | BLACKBERRY_ES_WORD_ATTACHMENT_OVERFLOW.NASL |
description | The version of BlackBerry Enterprise Server on the remote host reportedly contains flaws in its handling of Word and TIFF document attachments that may result in buffer overflows when a user opens a malformed file on a BlackBerry device. A remote attacker may be able to exploit this issue to execute code on the affected host subject to the privileges under which the application runs, generally |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 20950 |
published | 2006-02-20 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/20950 |
title | BlackBerry Enterprise Server Attachment Handling Buffer Overflows |
code |
|
References
- http://www.blackberry.com/knowledgecenterpublic/livelink.exe/fetch/2000/8021/8149/8052/Support_-_Corrupt_Word_file_may_cause_buffer_overflow_in_the_BlackBerry_Attachment_Service.html?nodeid=1181753&vernum=2
- http://www.securityfocus.com/archive/1/424728/100/0/threaded
- http://www.securityfocus.com/bid/16590
- http://www.vupen.com/english/advisories/2006/0530
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24629