BlackBerry 10.x < 10.2.0.1055 'qconnDoor' Buffer Overflow

High Nessus Network Monitor Plugin ID 8217

Synopsis

The BlackBerry mobile device is vulnerable to a buffer overflow.

Description

Versions of BlackBerry 10.x earlier than 10.2.0.1055 are affected by a buffer overflow vulnerability in the 'qconnDoor' service. An attacker could leverage this for denial of service attacks and possibly arbitrary code execution. A successful attack requires having turned on developer mode once during the phone's runtime (and notably, can still be exploited even after the mode has been shut off).

Solution

Upgrade the BlackBerry to 10.2.0.1055, or later. Refer to the vendor's advisory for mitigation involving the development mode, Wi-Fi and safely using USB functionality.

See Also

http://www.modzero.ch/advisories/MZ-13-05-Blackberry_Z10-qconnDoor.txt

http://seclists.org/bugtraq/2014/Apr/35

http://www.blackberry.com/btsc/KB35816

Plugin Details

Severity: High

ID: 8217

Published: 2014/04/30

Modified: 2016/01/30

Dependencies: 4545

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:ND/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:blackberry:blackberry_os

Patch Publication Date: 2014/04/08

Vulnerability Publication Date: 2014/04/08

Reference Information

CVE: CVE-2014-2389

BID: 66702