Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

GOPHER:IE-GOPHER-OF

Severity

Low

Recommended

No

Category

GOPHER

Keywords

Internet Explorer Gopher Client Buffer Overflow

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

GOPHER: Internet Explorer Gopher Client Buffer Overflow


This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer using the Gopher protocol. A malicious URL can be embedded in an image tag (<IMG>) on a malicious Web server to cause a client to visit that URL and become vulnerable to arbitrary code execution. If the malicious Gopher server is running on a computer other than the Web server that contained the embedded URL, attackers can send a popular bindshell() type Windows shellcode to the client after the +ABSTRACT Gopher tag.

Extended Description

Microsoft Internet Explorer, Proxy Server and ISA Server includes a gopher client. Reportedly, these clients are vulnerable to a buffer overflow condition. The vulnerability exists in the component that parses gopher replies. A malicious server is able to send a reply that will overflow the buffer and run arbitrary code on a user's system.

Affected Products

  • Microsoft Internet Explorer 5.0.1
  • Microsoft Internet Explorer 5.0.1 SP1
  • Microsoft Internet Explorer 5.0.1 SP2
  • Microsoft Internet Explorer 5.5
  • Microsoft Internet Explorer 5.5 SP1
  • Microsoft Internet Explorer 5.5 SP2
  • Microsoft Internet Explorer 6.0
  • Microsoft ISA Server 2000 SP1
  • Microsoft ISA Server 2000
  • Microsoft Proxy Server 2.0
  • Microsoft Proxy Server 2.0 SP1

References

  • BugTraq: 4930
  • CVE: CVE-2002-0371
  • URL: http://www.microsoft.com/technet/security/bulletin/ms02-027.asp
  • URL: http://www.kb.cert.org/vuls/id/440275

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out