Short Name |
P2P:EMULE:DECODE16-OVERFLOW |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
P2P |
Keywords |
eMule DecodeBase16 Overflow |
Release Date |
2004/04/14 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against eMule v0.42. eMule v0.42 and earlier are vulnerable. Attackers can send excessive amounts of hex-encoded data in an IRC private message to execute arbitrary code in the user context.
eMule is prone to a remote buffer overflow vulnerability. This issue is due to a failure of the application to properly validate buffer boundaries during memory copy operations. Successful exploitation would immediately produce a denial of service condition in the affected process. This issue may also be leveraged to execute code on the affected system within the security context of the user running the vulnerable process.