APP: Bomberclone Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Bomberclone. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user that is running the application. This signature is based on the public PoC in the Metasploit Framework.

Extended Description

BomberClone is prone to a buffer-overflow vulnerability. This issue is due to a failure in the application to perform proper boundary checks on user-supplied data before storing it in a finite sized buffer. This issue may be exploited to execute arbitrary code in the context of the user who is running the application. Version 0.11.6.2 is vulnerable; other versions may also be affected.

Affected Products

Debian linux

References

BugTraq: 16697

CVE: CVE-2006-0460

Short Name
APP:BOMBER-BO
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Bomberclone Buffer CVE-2006-0460 Overflow bid:16697
Release Date
05/19/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
UDP/11000
False Positive
Unknown
Vendors

Debian

Gentoo

Bomberclone

CVSS Score

7.5

Found a potential security threat?