Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

FTP:TRIPWIRE-FORMAT-STRING

Severity

Major

Recommended

No

Category

FTP

Keywords

Tripwire Email Reporting Format String

Release Date

2013/06/20

Update Number

2275

Supported Platforms

idp-4.0+, isg-3.4+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

FTP: Tripwire Email Reporting Format String


This signature detects attempts to exploit a known vulnerability against Tripwire Email Reporting. A successful attack can lead to arbitrary code execution.

Extended Description

Tripwire is affected by an email reporting format string vulnerability. This issue is due to a failure to properly inplement a formatted string function. This vulnerability will allow for execution of arbitrary code on a system running the affected software. This would occur in the security context of the user invoking the vulnerable application; typically the superuser. **Update - It is reported that this issue only presents itself when the MAILMETHOD is sendmail.

Affected Products

  • Tripwire tripwire 2.2.1
  • Tripwire tripwire 2.3.0 .0
  • Tripwire tripwire 2.3.1
  • Tripwire tripwire 2.3.1 -2
  • Tripwire tripwire 2.4.0 .0
  • Tripwire tripwire 2.4.2
  • Tripwire tripwire 3.0.0
  • Tripwire tripwire 3.0.0 1
  • Tripwire tripwire 4.0.0
  • Tripwire tripwire 4.0.1
  • Tripwire tripwire 4.1.0
  • Tripwire tripwire_open_source 2.3.0 .0
  • Tripwire tripwire_open_source 2.3.1

References

  • BugTraq: 10454
  • CVE: CVE-2004-0536

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out