Short Name |
LDAP:NA-PGP-KEYSERVER-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
LDAP |
Keywords |
Network Associates PGP KeyServer 7 LDAP Buffer Overflow |
Release Date |
2012/01/25 |
Update Number |
2070 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Network Associates PGP KeyServer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
The Lightweight Directory Access Protocol (LDAP) is designed to be a lightweight access protocol for directory services supporting X.500 models. It offers a means of searching, fetching and manipulating directory content. Several boundary condition errors have been found to exist in the LDAP implementation used by the Network Associates PGP Keyserver. The problem were discovered using the PROTOS project's LDAPv3 test suite. Several test cases provided by the test suite failed, indicating the prescence of buffer overflow vulnerabilities. At least one of the problems enables a remote attacker to execute arbitrary code with the privileges of the PGP Keyserver. Because the server typically runs with system privileges, this may lead to full system compromise. Further technical details are not available at this time.