First published: Sat Feb 18 2006(Updated: )
Buffer overflow in BlackBerry Attachment Service in Research in Motion (RIM) BlackBerry Enterprise Server 2.2 and 4.0 before SP3 Hotfix 4 for IBM Lotus Domino, 3.6 before SP7 and 5.0 before SP3 Hotfix 3 for Microsoft Exchangem, and 4.0 for Novell GroupWise before SP3 Hotfix 1 might allow user-assisted remote attackers to execute arbitrary code on the server via a crafted Microsoft Word document that is opened on a wireless device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rim Blackberry Enterprise Server | =4.0_sp1 | |
Rim Blackberry Enterprise Server | =4.0 | |
Rim Blackberry Enterprise Server | =2.2_sp2a | |
Rim Blackberry Enterprise Server | =2.2 | |
Rim Blackberry Enterprise Server | =4.0_sp2 | |
Rim Blackberry Enterprise Server | =2.2_sp3a | |
Rim Blackberry Enterprise Server | =3.6 | |
Rim Blackberry Enterprise Server | =4.0_sp3 | |
Rim Blackberry Enterprise Server | =4.0_sp2 | |
Rim Blackberry Enterprise Server | =3.6_sp1a | |
Rim Blackberry Enterprise Server | =2.2_sp4 | |
Rim Blackberry Enterprise Server | =4.0 | |
Rim Blackberry Enterprise Server | =4.0_sp3 | |
Rim Blackberry Enterprise Server | =3.6_sp4_hotfix2 | |
Rim Blackberry Enterprise Server | =4.0_sp1 | |
Rim Blackberry Enterprise Server | =3.6.1 | |
Rim Blackberry Enterprise Server | =2.2_sp4_hotfix2 | |
Rim Blackberry Enterprise Server | =2.2_sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0761 has a moderate severity rating due to its potential to cause buffer overflow in the BlackBerry Attachment Service.
To fix CVE-2006-0761, you should apply the necessary hotfixes and patches provided by RIM for your version of BlackBerry Enterprise Server.
CVE-2006-0761 affects multiple versions of BlackBerry Enterprise Server, specifically versions 2.2 and 4.0 before specific service pack hotfixes.
The risks associated with CVE-2006-0761 include potential unauthorized access and execution of arbitrary code due to the buffer overflow vulnerability.
Yes, current users of the affected versions should be vigilant and ensure they apply all relevant security updates to mitigate risks from CVE-2006-0761.