Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:WEBSENSE-TRITON-RCE

Severity

Critical

Recommended

Yes

Recommended Action

Drop

Category

APP

Keywords

Websense Triton 'ws_irpt.exe' Remote Command Execution Vulnerability

Release Date

2012/05/04

Update Number

2130

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: Websense Triton 'ws_irpt.exe' Remote Command Execution Vulnerability


This signature detects attempts to exploit a known flaw in Websense Triton. A successful attack would result in SYSTEM-level command execution. This vector is normally protected by SSL/TLS encryption. In such cases, in order for the IDP to protect your server, the SSL private key must be loaded on the IDP, the SSL Forward Proxy feature must be utilized, or some other SSL off-loading system must be used.

Extended Description

Websense Triton is prone to a remote command-execution vulnerability. An attacker can exploit this issue to execute arbitrary commands with SYSTEM-level privileges. Successfully exploiting this issue will result in the complete compromise of affected computers.

Affected Products

  • Websense Web Filter 7.6
  • Websense Web Security 7.6
  • Websense Web Security Gateway 7.6
  • Websense Web Security Gateway Anywhere 7.6

References

  • BugTraq: 51086
  • URL: http://www.websense.com
  • URL: https://www.websense.com/content/mywebsense-hotfixes.aspx

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out