APP: DiskPulse Server 'GetServerInfo' Buffer Overflow Remote Code Execution Vulnerability

This signature detects attempts to exploit a known remote code-execution vulnerability in DiskPulse Server. It is because it fails to properly bounds-check user-supplied data. Specifically, a buffer-overflow condition occurs when an overly long string is provided in the "GetServerInfo" request. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts can cause denial-of-service conditions.

Extended Description

DiskPulse Server is prone to a remote code-execution vulnerability because it fails to properly bounds-check user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. DiskPulse Server 2.2.34 is vulnerable; other versions may also be affected.

Affected Products

Flexense diskpulse_server

Short Name
APP:DISKPULSE-GETSERVERINFO-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
'GetServerInfo' Buffer Code DiskPulse Execution Overflow Remote Server Vulnerability bid:43919
Release Date
11/09/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
tcp/9120
False Positive
Unknown
Vendors

Flexense

Found a potential security threat?