Short Name |
HTTP:STC:DL:URSOFT-W32DASM-BOF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Ursoft W32Dasm Buffer Overflow |
Release Date |
2013/08/07 |
Update Number |
2288 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Ursoft W32Dasm. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
W32Dasm is reportedly affected by a buffer overflow vulnerability. This issue is due to a failure of the application to properly validate the length of strings in a file loaded for debugging prior to copying them into static process buffers. It is reported that this issue affects W32Dasm version 8.93; earlier versions may also be affected.