Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Update Details

Security Intelligence Center
Print

Update #2978 (08/08/2017)

2 new signatures:

HIGHHTTP:FREERADIUS-DATAVP-WIMAX-BOHTTP: FreeRADIUS data2vp_wimax Heap Buffer Overflow
HIGHSSL:CISCO-PRIME-PROVISIONING-DTSSL: Cisco Prime Collaboration Provisioning logconfigtracer.jsp Directory Traversal

3 updated signatures:

HIGHHTTP:STC:STREAM:DIRECTX-MJPEGHTTP: Microsoft DirectX Crafted MJPEG Stream Handling Code Execution
HIGHHTTP:STC:DL:REAL-3GP-FILE-MCHTTP: RealPlayer 3GP File Handling Memory Corruption
HIGHHTTP:STC:IE:CVE-2016-7202-RCEHTTP: Microsoft Internet Explorer CVE-2016-7202 Remote Code Execution

1 renamed signature:

HTTP:MISC:HTTP-EMPTY-HDR-DOS->HTTP:MISC:EMPTY-HDR-DOS


Details of the signatures included within this bulletin:


HTTP:STC:DL:REAL-3GP-FILE-MC - HTTP: RealPlayer 3GP File Handling Memory Corruption

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against RealPlayer. A successful attack can result in a server denial of service or arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141597, idp-5.1.110160603

References:

  • url: http://www.real.com/

HTTP:STC:IE:CVE-2016-7202-RCE - HTTP: Microsoft Internet Explorer CVE-2016-7202 Remote Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141597, idp-5.1.110160603

References:

  • cve: CVE-2016-7202

HTTP:MISC:EMPTY-HDR-DOS - HTTP: Empty Header Denial of Service

Severity: MEDIUM

Description:

This signature detects attempts to exploit a known vulerability against HTTP header for known web servers. Using a malicious HTTP client, attackers can send a maliciously crafted request that contains an empty Range or Connection header field to a Web server to crash the Web server daemon; the system must be manually restarted to restore service.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141597, idp-5.1.110160603

References:

  • bugtraq: 99137
  • cve: CVE-2017-7668
  • url: http://archives.neohapsis.com/archives/bugtraq/2003-04/0095.html

HTTP:STC:STREAM:DIRECTX-MJPEG - HTTP: Microsoft DirectX Crafted MJPEG Stream Handling Code Execution

Severity: HIGH

Description:

This signature detects attempts to exploit a known vulnerability against Microsoft DirectX. A successful attack can lead to arbitrary code execution.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141597, idp-5.1.110160603

References:

  • cve: CVE-2008-0011
  • bugtraq: 29581

Affected Products:

  • Nortel Networks ENSM - Enterprise NMS 10.4
  • Nortel Networks ENSM - Enterprise NMS 10.5
  • HP Storage Management Appliance 2.1
  • Nortel Networks Centrex IP Client Manager 10.0
  • Microsoft DirectX 9.0
  • Microsoft DirectX 9.0 c
  • Nortel Networks Self-Service Peri Workstation
  • Nortel Networks Self-Service WVADS
  • Avaya Messaging Application Server MM 3.0
  • Microsoft DirectX 9.0 a
  • Microsoft DirectX 8.1
  • Avaya Messaging Application Server
  • Nortel Networks Self-Service MPS 100
  • Nortel Networks Self-Service MPS 500
  • Nortel Networks Self-Service MPS 1000
  • Nortel Networks Self-Service Speech Server
  • Microsoft DirectX 8.1 a
  • Microsoft DirectX 8.1 b
  • Microsoft DirectX 10.0
  • Nortel Networks CallPilot 703T
  • Nortel Networks CallPilot 702T
  • Nortel Networks CallPilot 201I
  • Nortel Networks CallPilot 200I
  • Nortel Networks Contact Center
  • Nortel Networks Contact Center Manager Server
  • Nortel Networks Self-Service Peri Application
  • Avaya Messaging Application Server MM 1.1
  • Avaya Messaging Application Server MM 3.1
  • Nortel Networks Contact Center Express
  • Nortel Networks Contact Center - TAPI Server
  • Nortel Networks Self-Service CCXML
  • Nortel Networks Self Service VoiceXML
  • Avaya Messaging Application Server MM 2.0
  • Nortel Networks Symposium Agent
  • Nortel Networks CallPilot 1002Rp
  • Nortel Networks Multimedia Comm MCS5100
  • Nortel Networks Contact Center NCC
  • Nortel Networks Self-Service - CCSS7
  • Nortel Networks Centrex IP Client Manager 9.0
  • Microsoft DirectX 9.0b
  • Nortel Networks Centrex IP Client Manager 11.0
  • Nortel Networks Self-Service Media Processing Server

HTTP:FREERADIUS-DATAVP-WIMAX-BO - HTTP: FreeRADIUS data2vp_wimax Heap Buffer Overflow

Severity: HIGH

Description:

A heap-based buffer overflow vulnerability has been reported in FreeRADIUS. A remote attacker can exploit the vulnerability by sending a crafted RADIUS packet with a malformed WiMAX attribute with the continuation flag set. Successful exploitation could result in arbitrary code execution in the security context of the FreeRADIUS server.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, j-series-9.5, idp-4.2.110100823, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, vsrx-12.1, vsrx-15.1, isg-3.5.141597, idp-5.1.110160603

References:

  • bugtraq: 99876
  • cve: CVE-2017-10984

SSL:CISCO-PRIME-PROVISIONING-DT - SSL: Cisco Prime Collaboration Provisioning logconfigtracer.jsp Directory Traversal

Severity: HIGH

Description:

An information disclosure vulnerability has been reported in Cisco Prime Collaboration Provisioning. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to the target system. Successful exploitation results in the disclosure of the contents of arbitrary files from the target system.

Supported On:

isg-3.5.141652, idp-5.1.110161014, idp-4.1.110110719, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, mx-16.1, idp-4.2.0, srx-17.3, vmx-17.4, idp-5.0.0, isg-3.4.0, isg-3.5.0, isg-3.4.139899, j-series-9.5, srx-12.1, srx-branch-12.1, idp-4.2.110100823, idp-5.0.110130325, mx-11.4, isg-3.4.140032, idp-4.2.110101203, vsrx-12.1, idp-5.1.0, idp-5.0.110121210, vsrx-15.1, idp-4.1.110110609, isg-3.5.141597, idp-5.1.110160603

References:

  • bugtraq: 98522
  • cve: CVE-2017-6621
Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out