Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

SCAN:MISC:NETCAT-DOEXEC-BO

Severity

Major

Recommended

No

Recommended Action

Drop

Category

SCAN

Keywords

Netcat 1.1 doexec.c Buffer Overflow

Release Date

2013/02/26

Update Number

2236

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

SCAN: Netcat 1.1 doexec.c Buffer Overflow


This signature detects attempts to exploit a known vulnerability in Netcat 1.1. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Extended Description

NetCat is prone to a remotely exploitable buffer overflow. This issue is exposed when the program handles a client request when listening in exec mode, which is specified by the '-e' command line option. Successful exploitation will allow execution of arbitrary code in the context of the program. It is noted that this issue affects the Windows port, and is not known or confirmed to affect the UNIX-based netcat utility.

Affected Products

  • Netcat netcat 1.1.0

References

  • BugTraq: 12106
  • CVE: CVE-2004-1317

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out