CONFERENCE NOW LIVE: Threat Detection & Incident Response (TDIR) Summit - Join the Event In-Progress
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

RCE Flaw Found in Bopup Enterprise Messaging Tool

Trustwave has disclosed an unpatched remote code execution (RCE) vulnerability affecting Bopup Communication Server, a solution that allows enterprises to manage and control their IM communications.

Trustwave has disclosed an unpatched remote code execution (RCE) vulnerability affecting Bopup Communication Server, a solution that allows enterprises to manage and control their IM communications.

The flaw, discovered by Trustwave researcher Neil Kettle, is a buffer overflow related to how packets sent to the remote administration port on 19809/TCP, one of the two ports used by Bopup Communications Server, are handled and parsed prior to authentication. The security hole can be exploited by sending specially crafted packets to the application.

“Through this, an attacker can execute arbitrary code on the remote host with the privileges of the Bopup Communications Server, namely SYSTEM. The issue occurs due to a lack of bounds validation in several calls to memcpy with user-definable lengths with the destination buffer allocated on the stack,” Trustwave said in its advisory.

Kettle discovered the vulnerability while trying to reverse engineer Bopup Communication Server and the protocol it uses. Trustwave’s advisory includes proof-of-concept (PoC) code that can be used to exploit the flaw.

Trustwave said the vulnerability affects Bopup Communication Server version 4.5.3.13001 and earlier. B-Labs was notified about the issue in mid-July, but the vendor has been unresponsive and the flaw remains unpatched. SecurityWeek has reached out to B-Labs for comment and will update this article if the company responds.

Until a patch becomes available, Bopup Communication Server users can protect themselves against potential attacks by using intrusion prevention and intrusion detection systems, Trustwave said.

Related Reading: Researchers Claim Wickr Patched Flaws but Didn’t Pay Rewards

Related Reading: Flaw Allows Hackers to Alter “Signal” Attachments

Advertisement. Scroll to continue reading.

Related Reading: Attackers Can Target Enterprises via GroupWise Collaboration Tool

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Jeremy Koppen has left Mandiant after 13 years to become the CISO of Equifax.

Engineering and technology solutions provider Amentum has appointed Max Shier as its CISO.

PAM provider Keeper Security has appointed Shane Barney as its Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.