Short Name |
HTTP:STC:DL:ORBITAL-VIEWER-ORB |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Orbital Viewer ORB File Parsing Remote Code Execution |
Release Date |
2012/03/02 |
Update Number |
2092 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Orbital Viewer. A successful attack can lead to arbitrary code execution.
Orbital Viewer is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker could exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Orbital Viewer 1.04 is vulnerable; other versions may also be affected.