Short Name |
HTTP:EXPLOIT:WEBMIN-FS-INT |
---|---|
Severity |
Major |
Recommended |
No |
Category |
HTTP |
Keywords |
Webmin Format String Integer Wrap |
Release Date |
2010/04/05 |
Update Number |
1647 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Webmin. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Perl is prone to a format-string vulnerability because it fails to properly handle format specifiers in formatted-printing functions. An attacker may leverage this issue to write to arbitrary process memory, facilitating code execution in the context of the Perl interpreter process. This can result in unauthorized remote access. Developers should treat the formatted-printing functions in Perl as equivalently vulnerable to exploits as the C library versions and should properly sanitize all data passed in the format-specifier argument. All applications that use formatted-printing functions in an unsafe manner should be considered exploitable.