Short Name |
HTTP:STC:DL:DBP-FILE-BOF |
---|---|
Severity |
Major |
Recommended |
No |
Category |
HTTP |
Keywords |
Microsoft Visual Studio dbp File Handling Buffer Overflow |
Release Date |
2013/08/20 |
Update Number |
2291 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the Visual Studio dbp File. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Microsoft Visual Studio is prone to a buffer-overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to an insufficiently sized memory buffer. This issue allows attackers to execute arbitrary code in the context of the user viewing a malicious file. As viewing a project file is usually considered to be a safe operation, users may have a false sense of security by attempting to inspect unknown code prior to compiling or executing it. This vulnerability may be remotely exploited due to project files originating from untrusted sources. Visual Studio 6 is reportedly vulnerable to this issue; other versions may also be affected.