Short Name |
SCAN:MISC:NETCAT-DOEXEC-BO |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
SCAN |
Keywords |
Netcat 1.1 doexec.c Buffer Overflow |
Release Date |
2013/02/26 |
Update Number |
2236 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Netcat 1.1. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.
NetCat is prone to a remotely exploitable buffer overflow. This issue is exposed when the program handles a client request when listening in exec mode, which is specified by the '-e' command line option. Successful exploitation will allow execution of arbitrary code in the context of the program. It is noted that this issue affects the Windows port, and is not known or confirmed to affect the UNIX-based netcat utility.