HTTP: Webmin Format String Integer Wrap

This signature detects attempts to exploit a known vulnerability in Webmin. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Perl is prone to a format-string vulnerability because it fails to properly handle format specifiers in formatted-printing functions. An attacker may leverage this issue to write to arbitrary process memory, facilitating code execution in the context of the Perl interpreter process. This can result in unauthorized remote access. Developers should treat the formatted-printing functions in Perl as equivalently vulnerable to exploits as the C library versions and should properly sanitize all data passed in the format-specifier argument. All applications that use formatted-printing functions in an unsafe manner should be considered exploitable.

Affected Products

Ipcop ipcop

References

BugTraq: 15629

CVE: CVE-2005-3912

Short Name
HTTP:EXPLOIT:WEBMIN-FS-INT
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2005-3912 Format Integer String Webmin Wrap bid:15629
Release Date
04/05/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Red_hat

Conectiva

Suse

Apple

Trustix

Sun

Hp

Larry_wall

Ipcop

Webmin

Ubuntu

Gentoo

Openpkg

Mandriva

Openbsd

Debian

Curtis_hawthorne

CVSS Score

7.5

Found a potential security threat?