HTTP: Microsoft Visual Studio dbp File Handling Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Visual Studio dbp File. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Extended Description

Microsoft Visual Studio is prone to a buffer-overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to an insufficiently sized memory buffer. This issue allows attackers to execute arbitrary code in the context of the user viewing a malicious file. As viewing a project file is usually considered to be a safe operation, users may have a false sense of security by attempting to inspect unknown code prior to compiling or executing it. This vulnerability may be remotely exploited due to project files originating from untrusted sources. Visual Studio 6 is reportedly vulnerable to this issue; other versions may also be affected.

Affected Products

Microsoft visual_studio

References

BugTraq: 16953

CVE: CVE-2006-1043

Short Name
HTTP:STC:DL:DBP-FILE-BOF
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Buffer CVE-2006-1043 File Handling Microsoft Overflow Studio Visual bid:16953 dbp
Release Date
08/20/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Microsoft

CVSS Score

5.1

Found a potential security threat?