RCE Flaw Found in Bopup Enterprise Messaging Tool

Trustwave has disclosed an unpatched remote code execution (RCE) vulnerability affecting Bopup Communication Server, a solution that allows enterprises to manage and control their IM communications.

The flaw, discovered by Trustwave researcher Neil Kettle, is a buffer overflow related to how packets sent to the remote administration port on 19809/TCP, one of the two ports used by Bopup Communications Server, are handled and parsed prior to authentication. The security hole can be exploited by sending specially crafted packets to the application.

“Through this, an attacker can execute arbitrary code on the remote host with the privileges of the Bopup Communications Server, namely SYSTEM. The issue occurs due to a lack of bounds validation in several calls to memcpy with user-definable lengths with the destination buffer allocated on the stack,” Trustwave said in its advisory.

Kettle discovered the vulnerability while trying to reverse engineer Bopup Communication Server and the protocol it uses. Trustwave’s advisory includes proof-of-concept (PoC) code that can be used to exploit the flaw.

Trustwave said the vulnerability affects Bopup Communication Server version 4.5.3.13001 and earlier. B-Labs was notified about the issue in mid-July, but the vendor has been unresponsive and the flaw remains unpatched. SecurityWeek has reached out to B-Labs for comment and will update this article if the company responds.

Until a patch becomes available, Bopup Communication Server users can protect themselves against potential attacks by using intrusion prevention and intrusion detection systems, Trustwave said.

Related Reading: Researchers Claim Wickr Patched Flaws but Didn't Pay Rewards

Related Reading: Flaw Allows Hackers to Alter "Signal" Attachments

Related Reading: Attackers Can Target Enterprises via GroupWise Collaboration Tool

view counter
image
Previous Columns by Eduard Kovacs:
Tags:
Original author: Eduard Kovacs