HTTP: Juniper SSL-VPN Client ActiveX Control

This signature detects attempts to use unsafe ActiveX controls in Juniper SSL-VPN Client. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the client application.

Extended Description

Juniper SSL-VPN Client ActiveX control is prone to a buffer-overflow vulnerability. The software fails to perform sufficient bounds-checking of user-supplied input before copying it to an insufficiently sized memory buffer. Invoking the object from a malicious website may trigger the condition. If the vulnerability were successfully exploited, this would corrupt process memory, resulting in arbitrary code execution. Arbitrary code would be executed in the context of the client application.

Affected Products

Juniper_networks ssl-vpn_client

References

BugTraq: 17712

CVE: CVE-2006-2086

Short Name
HTTP:STC:ACTIVEX:JNPR-SSL-VPN
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
ActiveX CVE-2006-2086 Client Control Juniper SSL-VPN bid:17712
Release Date
10/26/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Juniper_networks

CVSS Score

7.5

Found a potential security threat?