Security Holes Found In RIM BlackBerry Service 89
An anonymous reader writes "Researchers have found several security holes in Blackberry handheld devices and the servers that power them, according to a story at Washingtonpost.com. The research points out serious flaws in the BlackBerry server, which could be exploited by convincing Blackberry handheld users to click on an image file attachment. From the article: 'Lindner's slides from his presentation -- which he agreed not to release until RIM has fully fixed this problem -- show that the Blackberry server which manages all of the encryption keys needed to unscramble e-mail traffic to and from all Blackberry devices registered on the network stores them on a Microsoft SQL database server in plain, unencrypted text. Lindner found that by convincing a Blackberry user to click on a special image attachment, that handheld device could be made to pass on malicious code to the Blackberry server, which could then be taken over and used to intercept e-mails or as a staging point for other attacks within the network.'"
Ha! (Score:5, Funny)
*watches the karma drop* btw I'm a RIM supporter
How could they let this slip? (Score:1, Informative)
Re:How could they let this slip? (Score:4, Interesting)
Re:How could they let this slip? (Score:3, Informative)
BTW version 4 is causing duplicate calendar and address book entries for lotus notes users (all 800 of our blackberries are showing this bug yah!). We are debating going back to 3.6 as 4.0 only added wireless synch for address and memo dbs for the user. Not that big of a deal to plug it into a
Re:How could they let this slip? (Score:2)
Eric
Some BlackBerry stuff [ericgiguere.com] (not much)
Re:Good thing... (Score:5, Insightful)
Re:Good thing... (Score:2)
Re:Good thing... (Score:1)
Re:Good thing... (Score:1)
Re:Good thing... (Score:1)
Only surprise here... (Score:1)
Re:Only surprise here... (Score:2)
That should teach them to discriminate against the Irish! Had they had fairer hiring standards, they would have discovered the problem long ago!
Re:Only surprise here... (Score:1)
Re:administrate? (Score:1)
You really should stop that you know? Moral is already as high as it's going to get.
KFG
Re:Linux (Score:1)
eh (Score:1)
The article says it only affects certain versions of the servers, and than only a certain, corrupt image file. THAN it only prevents you from getting other attachments.
Not exactly a big deal in my book (of course we use palms anyway, haha)
READ! (Score:4, Interesting)
If true, this is a gaping hole, and a very big deal.
Re:READ! (Score:3, Informative)
It is a pretty darn huge security hole, and one that shouldn't impact the home user (at least not yet) in any major fashion.
Then again, it is probably wishful thinking that Blackberry users are more technically knowledgeable than the average home user, and wouldn't open dumb emails from unsolicited sources.
Re:READ! (Score:2)
Second, it will not allow remote code execution or to take over the server, it stops the attachment service (Again, from reading the US-CERT advisory). It is classed as a DoS attack...as in Denial of Service....as in stopping the ability to use that service. This is not a remote code execution CERT advisory.
F
Re:READ! (Score:2, Informative)
From the top of the CERT advisory [cert.org]:
Should an exploit be developed, this arbitrary code would run inside the corporate firewall on a windows system, possibly with administrator priv
Re:READ! (Score:2)
However, in the advisory they said to disable all images because someone could possibly rename a TIFF to use another file extension.
And in TFA (as you put it) that is still paraphrasing Lindner. That article is the only place that mentions PNG files. Everything else only mentions TIFF files. It could be possible that the author misheard or mistakenly mentioned PNG's, and it could be that all PNG files will cause this but no one
RIMjob (Score:4, Funny)
Apparently they don't know their ass from a hole in the security, either.
Re:RIM (Score:2)
Interesting because UofW has an amazing Computer Science program, is reknown for the quality of the co-op students that they send out, and is one of the largest sources for technology labour in Canada.
Re:RIM (Score:1)
The University of Texas is likewise renowned for its computer science program -- but as a programmer working in Austin (and thus frequently alongside UT graduates), I've only met one who's really impressed me.
CSU Chico, where I attended, had a strong claim to have one of the best computer science program
Re:RIM (Score:2)
Re:RIM (Score:2)
It's not hiring newbs at all that's the problem -- it's hiring too many of them, and expecting them to be actually useful without an extended training and mentoring period. There are a few who can do that -- but even then, mentoring and simple experience is absolutely essential.
Bringing in a bit of new blood now and again is a good thing. Having a workforce devoid of practical experience is a recipe for disaster.
Re:RIM (Score:5, Interesting)
The fact that they made a small design mistake isn't really that surprising. These things happen all the time. Their response is what's important going forward, and I (as a current BB user) have faith that they will quickly patch this up and move on.
Re:RIM (Score:1, Interesting)
They made two big mistakes with their design. This kind of thing should be surprising. If they're selling a product used in millions of businesses, it has to be secure. Storing important information in unencrypted text and
Re:RIM (Score:2)
Re:RIM (Score:1, Insightful)
If the vast majority of the tech side is "very impressive" then this mistake wouldn't have been made, the structure and design of these systems should have been done in a team environment, and someone with experience should have flagged this in the very beginning.
there is, of course, a place for fresh grads, but it should be wo
Re:RIM (Score:2)
I definitely agree with you re: place for new hires.. I don't think many people would disagree. What I was trying to say is that this is very much the way things are within RIM (e.g. teams working on specific projects with a range of experience and ba
Re:RIM (Score:1)
It's unfounded subjective views like these that make reading slashdot feel like a waste of time.
Re:RIM (Score:1, Offtopic)
Re:RIM (Score:3, Insightful)
Using a Microsoft product on a server is a small design mistake?!?! You must be new here!
Re:RIM (Score:2)
Anyway.. I actually asked that question to folks in the tech side.. and their entire reasoning is that in 1999 (and arguably right now), the majority of their install base was running either Exchange or Notes as their email platform.. thus, in original design, they considered tight interoperability as critical to BB's success. That and MAPI allows pretty tight integration between Exchange and the BlackBerry Enterprise Server. (With BES 4.0 they added groupwise to th
Re:RIM (Score:4, Insightful)
The fact that they made a small design mistake isn't really that surprising. These things happen all the time.
I'm not sure you can write this off as a small design mistake. This seems to me more like a fundamental design flaw based on a series of bad choices. They want you to run a Windows based server, outside your firewall, running a number of services, with security data stored unencrypted, and full privileges to the corporate e-mail server. That sounds like someone's friend or nephew was running the server project and either would not listen to advice that things should be done right, rather than quickly, or simply was unable to hire competent personnel. This is why companies making products like these should have a security team outside each project's chain of command, and why that team should be listened to. Now, who will trust them to do the right thing next time. What security conscious company will consider them as a solution provider?
Re:RIM (Score:1)
The BlackBerry Enterprise Server does not, by any means, run outside the firewall.
Re:RIM (Score:2)
That was not a small mistake. It was a series of mistakes, some of which fell short of best practice and some of which fell short of standard practice.
In fact I'll use this case as an example to explain to clients why it's imperative not to store sensitive information in plaintext on an exposed server.
Re:RIM (Score:2)
Re:RIM (Score:1, Redundant)
Hehe ;-)
Job at rim? (Score:5, Funny)
Microshit Sequel Sewer? (Score:2)
So the real question is (Score:1)
Does Norton see this as Brick.Trojan?
Oops, that was the OTHER MegaCorp's product... Sorry, carry on.
Black-and-blue-berry (Score:5, Interesting)
I would like to try and convince most people with a Blackberry to see if they could use it as a suppository, but I digress...
From the Washington Post: RIM didn't mention anything about the flaw allowing attackers to download and execute programs on the targeted device, but I'm left wondering whether they escalated this because of just such a threat.
I really don't think RIM is going to shout this from the rooftops. If the exploit is as bad as is disclosed, there's some serious trouble brewing that makes the brouhaha with NTP look like a cakewalk.From the Washington Post: Lindner said he started looking into Blackberry's proprietary communications protocols because the Blackberry server requires an unusual level of access inside of a corporate network: the server must be run inside a company's network firewall and on a Windows machine that is granted full and direct administrative access to the customer's internal e-mail server.
And RIM thought this was a good idea because...? It's like building a 50-ft high wall around the castle, then creating a hole for an 8-lane superhighway to pass through. Imagine the enterprising and inventive hacker that can plant a zombie process on that machine. Talk about spam! Imagine if a Fortune 500 company starts getting nipped because their email servers are dumping spam on the unsuspecting public. Lawsuits for everyone!!
PATENT INFRINGEMENT! (Score:3, Funny)
Heh, I wasn't actually going to post that, but I had a thought... if we patented the dumbest mistakes out there (buffer overflows, etc)... what company would want to prove "prior art" ?
I see the issue with MS SQL, but... (Score:1)
Also- given some of the other flaws that I've discovered with BlackBerries (which is not to say that I'm not an addict), something like this is not wholly unexpected. I mean, they haven't yet managed to make the times
Re:I see the issue with MS SQL, but... (Score:1)
Re:I see the issue with MS SQL, but... (Score:1)
However that is built into the Blackberry itself and requires no backend interface.
Their sales guy told management POP3 was HIPAA compliant and that all communications to the POP3 servers was SSL encrypted. When I was tasked with making this work and asked them where I configure POP3s such as port number and SSL certificate, they said t
Sounds like SQL Injection? (Score:3, Interesting)
Anyway, can't administrators just filter all image attachments out through their AV or other software for the time being?
Re:Sounds like SQL Injection? (Score:2)
Then why is it that in 99% of the cases, whenever SQL injection is involved, SQL server is too? Must be really bad luck on Microsoft's part, I guess :-)
Re:Sounds like SQL Injection? (Score:5, Insightful)
Listen, kids: NEVER, NEVER, NEVER pass user-provided values into your SQL queries as strings. There's a reason every database access API in existance allows positional or named parameters to be passed outside the parser, and it's not just performance.
And if I sound a little grumpy on this topic -- like maybe I'd recently worked with a developer lacking just this sort of clue... well, maybe you'd be interpreting my tone correctly.
Re:Sounds like SQL Injection? (Score:2)
Re:Sounds like SQL Injection? (Score:2)
Maybe I should have said "every competant database access API in existance".
Re: (Score:2)
foibles (Score:1)
Scary. (Score:1)
Re:Scary. (Score:1)
More info here... (Score:2)
Blackberry handhelds/servers vulnerable to attack [fak3r.com]
I had no idea the server backend was so...crummy. Why do geeks running FreeBSD at home have their passwords encrypted within MySQL, but big companies with million dollar products don't?
Re:More info here... (Score:3, Informative)
The entire server backend is like that. Some of the more amusing examples:
- When it starts, it has a fixed number of threads it can use to talk to the Exchange server. Let's say it's 1000. If a thread is killed off, e.g. because it timed out, it is not returned to the pool. So over the course of a week or so, you run out of t
Re:More info here... (Score:2)
Re:More info here... (Score:2)
I would think a better open source-type option would be to either use a handheld that has some kind of X Window client for mail on a remote server (if you want it in realtime), or a regular mail client that syncs up its local copy of the inbox every once in awhile.
Honestly, there's no legitimate reason I can think of for the Blackberries to work the way they do, with mail passing through RIM between your mail server a
Why would you have to convince someone else? (Score:1)