APP: Autonomy Connected Backup Type 13 Command Injection

This signature detects attempts to exploit a known vulnerability in Autonomy Connected Backup. It is due to insufficient validation of commands contained in "Type 13" messages. A remote attacker can exploit this by by sending a maliciously crafted Type 13 command to an affected system. In a successful code injection attack, the behavior of the target host is entirely dependent on the intended function of the injected code and executes within the security context of the currently logged in user. If the attack is unsuccessful, the vulnerable application can terminate abnormally.

Extended Description

The Agent service in Iron Mountain Connected Backup 8.4 allows remote attackers to execute arbitrary code via a crafted opcode 13 request that triggers use of the LaunchCompoundFileAnalyzer class to send request data to the System.getRunTime.exec method.

Affected Products

Ironmountain connected_backup

Short Name
APP:MISC:AUTONOMY-CONN-TYPE-13
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
13 Autonomy Backup CVE-2011-2397 Command Connected Injection Type
Release Date
01/08/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/16388
False Positive
Unknown
Vendors

Ironmountain

CVSS Score

10.0

Found a potential security threat?