Lucene search

K
certCERTVU:392920
HistoryDec 31, 2005 - 12:00 a.m.

Research in Motion (RIM) BlackBerry Router vulnerable to denial of service via Server Routing Protocol (SRP)

2005-12-3100:00:00
www.kb.cert.org
11

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.147 Low

EPSS

Percentile

95.7%

Overview

The Research in Motion (RIM) BlackBerry Router contains a vulnerability in the way the router handles Server Routing Protocol (SRP) packets. By sending specially crafted SRP packets to the router, an attacker could cause a denial of service.

Description

The BlackBerry Router is a component of the BlackBerry Enterprise Server (BES). The BlackBerry Router manages connections and routes data between between BES servers, BlackBerry Infrastructure, BlackBerry Handhelds, and other BlackBerry client devices. A vulnerability in the way the BlackBerry Router could allow an attacker using specially crafted SRP packets to cause a denial of service. If the router stops functioning, BlackBerry communication will be disrupted.

The BlackBerry Router uses SRP to make an outbound connection to the BlackBerry Infrastructure on port 3101/tcp. In order to exploit this vulnerability, a remote attacker would need to subvert DNS or otherwise impersonate the BlackBerry Infrastructure or intercept the TCP connection. An attacker with access to the network containing the BlackBerry Router may be able to initiate TCP connections to the router to exploit the vulnerability.


Impact

By establishing a TCP connection with a BlackBerry Router, an unauthenticated, remote attacker could cause a denial of service, disrupting communication between BES components and BlackBerry Handheld devices.


Solution

RIM Technical Knowledge Center article KB-04758 states that “This is a previously reported issue that has been escalated internally to our development team. No resolution time frame is currently available.”


Deploy BlackBerry Routers and BES servers according to best practices, including restricting access to BlackBerry components using firewalls. Static DNS entries for BlackBerry Infrastructure hosts can help mitigate the risks of an attacker subverting DNS to impersonate the BlackBerry Infrastructure. Please see RIM Technical Knowledge Center article KB-04758 for further information.


Vendor Information

392920

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Research in Motion (RIM) __ Affected

Updated: December 30, 2005

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

Please see RIM Technical Knowledge Center article KB-04758.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23392920 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by FX of Phenoelit. Thanks to RIM for information used in this document.

This document was written by Art Manion.

Other Information

CVE IDs: CVE-2005-2342
Severity Metric: 5.41 Date Public:

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.147 Low

EPSS

Percentile

95.7%