Blackberry Security Hole



There’s another security warning out related to specially crafted image files. This time it’s targetted at the blackberry, which is a small portable email/pda device. Basically a corrupted TIFF may lead the user to be unable to view other image attachments. The US-CERT advisory seems to indicate that remote code execution could be possible, although there is no comment to this issue from the makers, Research in Motion.


The suggestion from Research in Motion (RIM in the quote) (via the Security Fix) is…

RIM doesn’t say when it plans to have a fix available, but for now it is urging companies who use the service to reconfigure any machine serving as an internal BlackBerry Internet Server to filter TIFF images or disable the file-attachment capability altogether.

Related Posts

Blog Traffic Exchange Related Posts
  • Oracle updates I normally don't follow updates for Oracle, as I don't have an installation running Oracle to support. Right now, I'm quite glad of that... The Security Fix is talking about the 82 patches they released Tuesday in their quarterly patch release. The fact that they released 82 patches is not......
  • The security of remote tech support (ultravnc sc or x11vnc with wrapper script) Well, I've got a nice way of doing "easy" one click (or one cut and paste) light desktop support for windows or linux, one uses ultravnc sc, the other uses x11vnc with a special wrapper script. So, what security flaws are there in this process? Well, for starters, I see......
  • Sony discs to be recalled It looks as though the uninstaller as claimed last night, does have more serious implications than the original rootkit, in Sony's continuing DRM nightmare. Basically, the uninstaller will allow any web page to run arbitrary code and or remotely control your pc. Which is sort of the holy grail of......
Blog Traffic Exchange Related Websites
  • Introduction To Keywords And Keyword Research What the heck are Keywords A keyword is a word or phrase , which you type in Google or any other search engine to get results. There are two kinds of keywords. 1. Short-tail Keywords: Keywords no more than two actual words. 2.Long-tail Keywords: Keywords with 3 or more actual......
  • Blogging – You’re Doing it WRONG! (Pt 2) This continues from part one and is part two in a two part series on what bloggers are doing wrong when it comes to blogging. Here are some more ideas for you to consider. Editorial Calendars and Patterning Audiences Chances are you don’t do it. Dosh Dosh writes a fantastic......
  • Securing Your Online Business With Internet Security Today, businesses are taking advantage of the Internet to market and sell their products and services. It is now considered a necessity for businesses to integrate the Internet in their operations in order to effectively compete with other businesses and become the best. The Internet offers many advantages in your......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site