POP3: UltraISO Cue File Stack Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the UltraISO. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

UltraISO is prone to a remote stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Successful exploits may allow attackers to execute arbitrary code with the privileges of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. UltraISO 8.6.2.2011 is vulnerable; other versions may also be affected.

Affected Products

Ezb_systems ultraiso

References

BugTraq: 24140

CVE: CVE-2007-2888

Short Name
POP3:DOS:ULTRAISO-CUE-BO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
POP3
Keywords
Buffer CVE-2007-2888 Cue File Overflow Stack UltraISO bid:24140
Release Date
12/07/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Ezb_systems

CVSS Score

7.6

Found a potential security threat?