Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:MISC:AUTONOMY-CONN-TYPE-13

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

Autonomy Connected Backup Type 13 Command Injection

Release Date

2013/01/07

Update Number

2222

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: Autonomy Connected Backup Type 13 Command Injection


This signature detects attempts to exploit a known vulnerability in Autonomy Connected Backup. It is due to insufficient validation of commands contained in "Type 13" messages. A remote attacker can exploit this by by sending a maliciously crafted Type 13 command to an affected system. In a successful code injection attack, the behavior of the target host is entirely dependent on the intended function of the injected code and executes within the security context of the currently logged in user. If the attack is unsuccessful, the vulnerable application can terminate abnormally.

Extended Description

The Agent service in Iron Mountain Connected Backup 8.4 allows remote attackers to execute arbitrary code via a crafted opcode 13 request that triggers use of the LaunchCompoundFileAnalyzer class to send request data to the System.getRunTime.exec method.

Affected Products

  • ironmountain connected_backup 8.4

References

  • CVE: CVE-2011-2397

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out