This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
A vulnerability in the BlackBerry Application Web Loader ActiveX control could allow an attacker to execute code remotely or to cause Microsoft Internet Explorer to crash, the company said.
"An exploitable buffer overflow exists in the BlackBerry Application Web Loader ActiveX control that Internet Explorer uses to install applications on BlackBerry devices," RIM explains in its advisory. "When a BlackBerry device user browses to a Web site that is designed to install the BlackBerry Application Web Loader ActiveX control on BlackBerry devices over a USB connection, and clicks 'Yes' to install and run the ActiveX control, the ActiveX control introduces the vulnerability to the computer."
RIM's warning comes in conjunction with a security advisory issued by Microsoft that updates its ActiveX kill bit list to include a kill bit to prevent the BlackBerry Application Web Loader ActiveX control from being exploited.
The vulnerability can be resolved by installing an updated version of the BlackBerry Application Web Loader. The RIM Web site also includes a workaround that describes how to disable the affected ActiveX control.
In its 2008 X-Force Trend and Risk report, released earlier this month, IBM reports that ActiveX controls accounted for 46% of all browser-related vulnerability disclosures in 2008, and 66% of browser-related vulnerabilities designated "critical" or "high."
There was an overall decline in browser-related vulnerability disclosures last year, according to IBM's report.
"Unfortunately, the decline in ActiveX disclosures does not appear to be making an impact on exploitation," the report said. "As with other browser-related vulnerabilities, attackers rely upon users who do not keep their browsers current. Although Microsoft has made great strides in preventing ActiveX exploitation through changes to Microsoft Internet Explorer, exploitation remains an issue along with the continued usage of known vulnerable ActiveX controls from non-malicious Web sites."
InformationWeek has published an independent analysis of what other security measures companies can take for their mobile workforces. Download the report here (registration required).
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.