Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:IIS:PERL-0A-ATTEMPT

Severity

Medium

Recommended

No

Category

HTTP

Keywords

IIS Perl Browse 0x0a Attempt

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: IIS Perl Browse 0x0a Attempt


This signature detects attacks against Microsoft IIS with Perl. Attacker can execute arbitrary commands on the system.

Extended Description

ActivePerl is an implementation of the Perl scripting language for Microsoft Windows systems developed by Activestate. ActivePerl allows for high-performance integration with IIS using a DLL called 'perlIIS.dll' to handle a '.plx' ISAPI extension. perlIIS.dll contains a remotely exploitable buffer overflow vulnerability in handling of the URL string. It is due to an unbounded string copy operation. All versions of ActivePerl prior to build 630 of ActivePerl 5.6.1 are believed to be vulnerable. This vulnerability requires that the option "Check that file exists" be disabled. This option is enabled by default. Exploitation of this vulnerability may allow for remote attackers to gain access to the target server.

Affected Products

  • Activestate ActivePerl 5.6.1

References

  • BugTraq: 3526
  • CVE: CVE-2001-0815

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out