HTTP: Orbital Viewer OV File Parsing Remote Code Execution

This signature detects attempts to exploit a known vulnerability against Orbital Viewer. A successful attack can lead to arbitrary code execution.

Extended Description

Orbital Viewer is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker could exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Orbital Viewer 1.04 is vulnerable; other versions may also be affected.

Affected Products

David_manthey orbital_viewer

References

BugTraq: 40985 38436

CVE: CVE-2010-0688

Short Name
HTTP:STC:DL:ORBITAL-VIEWER-OV
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2010-0688 Code Execution File OV Orbital Parsing Remote Viewer bid:38436 bid:40985
Release Date
01/19/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3671
False Positive
Unknown
Vendors

David_manthey

CVSS Score

9.3

Found a potential security threat?