Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:RANDOMIZATION-ENCODIN3

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Randomized Javascript Encodings Detection 3

Release Date

2015/10/07

Update Number

2543

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Randomized Javascript Encodings Detection 3


This signature detects JavaScript randomization encoding. The session most likely contains exploit code and should be blocked. A successful attack could result in arbitrary code execution with the privileges of the browser's user, possibly Administrator

Extended Description

Buffer overflow in the XHTTP Module 4.1.0.0 in the ActiveX control for SaschArt SasCam Webcam Server 2.6.5 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long argument to the Get method and other unspecified methods.

Affected Products

  • Saschart sascam_webcam_server 2.6.5

References

  • BugTraq: 33053
  • CVE: CVE-2008-6898
  • CVE: CVE-2009-4225
  • URL: http://www.moxa.com
  • URL: http://www.rec-sec.com/2010/01/25/aol-playlist-class-buffer-overflow/
  • URL: http://www.activepdf.com/products/serverproducts/webgrabber/

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out