Short Name |
HTTP:STC:DL:MS-VISUAL-CPP-RC-BO |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Microsoft Visual C++ Resource File Buffer Overflow |
Release Date |
2012/11/05 |
Update Number |
2200 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the Microsoft Visual C++. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected server.
Microsoft Visual C++ is prone to a stack-based buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service.