HTTP: Barracuda Spam Filter Command Execution

This signature detects attempts to exploit a known vulnerability against Barracuda Spam Filter. By supplying a specially crafted HTTP request, the client can cause the server to execute arbitrary commands.

Extended Description

Spam Firewall is prone to multiple vulnerabilities, including a directory-traversal issue, access-validation issue, and a remote command-execution issue. A remote attacker can exploit these issues to gain access to potentially sensitive information and execute commands in the context of the affected application. Versions 3.3.01.001 to 3.3.03.055 are vulnerable to these issues.

Affected Products

Barracuda_networks barracuda_spam_firewall

Short Name
HTTP:BARRACUDA:PREV-EXEC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Barracuda CVE-2006-4000 Command Execution Filter Spam bid:19276
Release Date
08/10/2006
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Barracuda_networks

CVSS Score

4.0

Found a potential security threat?