Serious Vulnerability in All Versions of Desktop Manager Before v5.0.1 – Workaround Available

denial This is kind of shocking. Earlier this week Tom let us know that RIM had pushed an update to his Desktop Manager. Now David let us know that RIM has published a security advisory that there is a vulnerability in all versions of Desktop Manager before version 5.0.1 that allows attackers to remotely execute code on your machine. The vulnerability seems to stem from the Lotus Notes Intellisync capability but is vulnerable even if Desktop Manager is not running!

RIM is recommending you either upgrade to Desktop Manager 5.0.1 or unregister the Lotus Notes DLL running the BlackBerry Desktop Manager, by going to StartMenu->Run and entering the command: regsvr32 /u "C:\Program Files\Research In Motion\BlackBerry\IS71 Connectors\Lotus Notes5.0\lnresobject.dll"

From RIM’s advisory:

This advisory relates to a vulnerability in a Lotus Notes Intellisync DLL that the BlackBerry Desktop Manager may use. This vulnerability may allow a malicious user to perform an attack that leverages social engineering to achieve remote code execution on the computer running the BlackBerry Desktop Manager. If the legitimate (logged in) user clicks a link to a malicious web site (for example, in an email message, in a browser, or an instant message) on the computer that is running the BlackBerry Desktop Manager, a vulnerability in an Intellisync component could allow the malicious user who sent the link or created the malicious web site to execute code on the computer using the privileges of the legitimate user.

Note: The affected Lotus Notes Intellisync DLL is included by default in all BlackBerry Desktop Manager installations. This vulnerability exists whether or not the DLL is used after installation. Issue Severity: This vulnerability has a Common Vulnerability Scoring System (CVSS) score of 9.3. Issue Status: Vulnerability confirmed. For more information, see the Resolution section.

via CIO.com

2 total comments on this postSubmit your comment!