APP: Microsoft Universal Plug and Play Invalid Header Overflow

This signature detects attempts to exploit a known vulnerability in Microsoft Windows Universal Plug and Play. A successful attack can lead to a buffer overflow and arbitrary remote code execution resulting in full control of the target system.

Extended Description

Microsoft Windows is prone to a remote stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. This occurs when handling certain HTTP requests. To exploit this issue, an attacker must be in the same network segment as the victim. Successful exploits may allow attackers to execute arbitrary code with the privileges of the affected service. Failed exploits attempts will likely result in denial-of-service conditions.

Affected Products

Microsoft windows_xp_tablet_pc_edition

Short Name
APP:UPNP:MS-UPNP
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
CVE-2007-1204 Header Invalid Microsoft Overflow Play Plug Universal and bid:23371
Release Date
04/10/2007
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3728
Port
TCP/2869
False Positive
Unknown
Vendors

Nortel_networks

Microsoft

Avaya

CVSS Score

6.8

Found a potential security threat?