Date: 13 April 2011
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2011.0431
Cross-site scripting (XSS) vulnerability in the BlackBerry Web Desktop
Manager component of the BlackBerry Enterprise Server
13 April 2011
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: BlackBerry Enterprise Server Express
BlackBerry Enterprise Server
Publisher: RIM
Operating System: Windows
Netware
Linux variants
Solaris
AIX
Impact/Access: Cross-site Scripting -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2011-0286
Original Bulletin:
http://blackberry.com/btsc/KB26296
- --------------------------BEGIN INCLUDED TEXT--------------------
Cross-site scripting (XSS) vulnerability in the BlackBerry Web Desktop Manager
component of the BlackBerry Enterprise Server
Products
Affected Software
This issue affects the BlackBerry Web Desktop Manager component of the
following software versions:
* BlackBerry Enterprise Server Express versions 5.0.1 and 5.0.2 for
Microsoft Exchange
* BlackBerry Enterprise Server Express version 5.0.2 for IBM Lotus Domino
* BlackBerry Enterprise Server versions 5.0.0 through 5.0.3 for Microsoft
Exchange and IBM Lotus Domino
* BlackBerry Enterprise Server version 5.0.1 for Novell GroupWise
Non Affected Software
* BlackBerry Device Software
* BlackBerry Desktop Software
* BlackBerry Internet Service
Are BlackBerry smartphones and the BlackBerry Device Software affected?
No.
Issue Severity
This vulnerability has a Common Vulnerability Scoring System (CVSS) score of 8.1.
Overview
This advisory describes a security issue whereby the BlackBerry Web Desktop
Manager component of the BlackBerry Enterprise Server is susceptible to a
reflective cross-site scripting (XSS) vulnerability. (Reflective cross-site
scripting vulnerabilities are sometimes referred to as non-persistent or Type I
cross-site scripting vulnerabilities.)
Who should read this advisory
BlackBerry Enterprise Server administrators
Who should apply the software fix(es)
BlackBerry Enterprise Server administrators
Recommendation
Complete the resolution actions documented in this advisory.
References
CVE Identifier: CVE-2011-0286
Problem
The vulnerability could allow an attacker to execute externally supplied
scripts using the user privileges of the BlackBerry Web Desktop Manager. This
could allow the attacker to perform any BlackBerry Web Desktop Manager task
that the legitimate user could perform on a BlackBerry smartphone while the
user is logged in to the BlackBerry Web Desktop Manager. Such tasks include
remotely resetting the device password and locking the device, remotely wiping
and disabling the device, and activating the user's account on another device
over the wireless network.
Successful exploitation of this issue requires an attacker to persuade the
legitimate user to click a specially crafted URL. The URL that the attacker
persuades the legitimate user to click may be in a web browser or an email or
instant message.
Mitigations
* As a best practice, RIM recommends that access to administrative
functions of the BlackBerry Enterprise Server, including BlackBerry Web
Desktop Manager, be allowed only from trusted networks or specific hosts.
* Refer to the documentation for your web browser to learn about potential
mitigation of cross-site scripting vulnerabilities.
Resolution
The following released versions of the BlackBerry Enterprise Server resolve
this issue:
BlackBerry Enterprise Server version 5.0.3 MR1 for Microsoft Exchange and IBM
Lotus Domino
* Visit http://www.blackberry.com/go/serverdownloads to obtain BlackBerry
Enterprise Server version 5.0.3 MR1.
BlackBerry Enterprise Server version 5.0.2 MR5 for Microsoft Exchange
* Visit http://www.blackberry.com/go/serverdownloads to obtain BlackBerry
Enterprise Server version 5.0.2 MR5.
RIM has issued the following interim security software updates that resolve the
vulnerability in affected versions of the BlackBerry Enterprise Server and the
BlackBerry Enterprise Server Express.
For BlackBerry Enterprise Server version 5.0.2 for IBM Lotus Domino
* Visit http://www.blackberry.com/go/serverdownloads to obtain Interim
Security Software Update for April 12, 2011.
For BlackBerry Enterprise Server version 5.0.1 for Microsoft Exchange, IBM
Lotus Domino, and Novell GroupWise
* Visit http://www.blackberry.com/go/serverdownloads to obtain Interim
Security Software Update for April 12, 2011.
For BlackBerry Enterprise Server Express version 5.0.2 for Microsoft Exchange
and IBM Lotus Domino
* Visit http://www.blackberry.com/go/serverdownloads to obtain Interim
Security Software Update for April 12, 2011
For BlackBerry Enterprise Server Express version 5.0.1 for Microsoft Exchange
* Visit http://www.blackberry.com/go/serverdownloads to obtain Interim
Security Software Update for April 12, 2011.
If you are using a software version that is not listed above, update to one of
the listed versions to apply the upgrade.
Acknowledgements
RIM would like to thank Ivan Huertas of Cybsec (http://www.cybsec.com) for his
involvement in helping to protect our customers.
Copyright 2010 Research In Motion Limited, unless otherwise noted.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFNpTTa/iFOrG6YcBERAmKSAJ9H1e1XbM+eEqAmQeJLhg4fniQphACfYc9j
c5vVAcgFml3dDmFqkzp4Zgc=
=dOrU
-----END PGP SIGNATURE-----
|