Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:DL:MAL-XRL

Severity

High

Recommended

No

Category

HTTP

Keywords

XRL Malformed File Format

Release Date

2012/10/16

Update Number

2193

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: XRL Malformed File Format


This signature detects attempts to exploit flaws in XRL files. XRL file type is primarily associated with 'xRadio Player'. Standards are defined for representing a XRL file. Any deviation from it can be an indication of malicious activity. This kind of behavior is mostly noticeable from exploits created using Metasploit Framework.

Extended Description

xRadio is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker could exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. xRadio 0.95b, 0.9, and 0.5 are vulnerable; other versions may also be affected.

Affected Products

  • @ktive software xRadio 0.5
  • @ktive software xRadio 0.9
  • @ktive software xRadio 0.95b

References

  • BugTraq: 46290

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out