Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:DBP-FILE-BOF

Severity

High

Recommended

No

Category

HTTP

Keywords

Microsoft Visual Studio dbp File Handling Buffer Overflow

Release Date

2013/08/20

Update Number

2291

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Microsoft Visual Studio dbp File Handling Buffer Overflow


This signature detects attempts to exploit a known vulnerability in the Visual Studio dbp File. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

Extended Description

Microsoft Visual Studio is prone to a buffer-overflow vulnerability. This issue is due to a failure of the application to properly bounds check user-supplied data prior to copying it to an insufficiently sized memory buffer. This issue allows attackers to execute arbitrary code in the context of the user viewing a malicious file. As viewing a project file is usually considered to be a safe operation, users may have a false sense of security by attempting to inspect unknown code prior to compiling or executing it. This vulnerability may be remotely exploited due to project files originating from untrusted sources. Visual Studio 6 is reportedly vulnerable to this issue; other versions may also be affected.

Affected Products

  • Microsoft Visual Studio 6.0
  • Microsoft Visual Studio 6.0 SP1
  • Microsoft Visual Studio 6.0 SP2
  • Microsoft Visual Studio 6.0 SP3
  • Microsoft Visual Studio 6.0 SP4
  • Microsoft Visual Studio 6.0 SP5

References

  • BugTraq: 16953
  • CVE: CVE-2006-1043

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out