Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

NFS:TRIPWIRE-FORMAT-STRING

Severity

High

Recommended

No

Category

NFS

Keywords

Tripwire Email Reporting Format String

Release Date

2013/06/21

Update Number

2275

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

NFS: Tripwire Email Reporting Format String


This signature detects attempts to exploit a known vulnerability against Tripwire Email Reporting. A successful attack can lead to arbitrary code execution.

Extended Description

Tripwire is affected by an email reporting format string vulnerability. This issue is due to a failure to properly inplement a formatted string function. This vulnerability will allow for execution of arbitrary code on a system running the affected software. This would occur in the security context of the user invoking the vulnerable application; typically the superuser. **Update - It is reported that this issue only presents itself when the MAILMETHOD is sendmail.

Affected Products

  • Tripwire 2.2.1
  • Tripwire 2.3.0 .0
  • Tripwire 2.3.1
  • Tripwire 2.3.1 -2
  • Tripwire 2.4.0 .0
  • Tripwire 2.4.2
  • Tripwire 3.0.0
  • Tripwire 3.0.0 1
  • Tripwire 4.0.0
  • Tripwire 4.0.1
  • Tripwire 4.1.0
  • Tripwire Tripwire Open Source 2.3.0 .0
  • Tripwire Tripwire Open Source 2.3.1

References

  • BugTraq: 10454
  • CVE: CVE-2004-0536

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out