Short Name |
APP:MISC:BOPUP-COMMUNICATION-BO |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Bopup Communications Server Buffer Overflow |
Release Date |
2012/10/31 |
Update Number |
2199 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the Bopup Communications Server. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
The Bopup Communication Server is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the affected server. Successful attacks will compromise the server and possibly the underlying computer. Failed attacks will likely cause denial-of-service conditions. Bopup Communication Server 3.2.26.5460 is vulnerable; other versions may also be affected.