Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

RPC:RLPR-FS

Severity

High

Recommended

No

Recommended Action

Drop

Category

RPC

Keywords

RLPR Daemon Format String

Release Date

2006/02/21

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

RPC: RLPR Daemon Format String


This signature detects attempts to exploit a known vulnerability in the RLPR daemon syslog logging function. A successful attacker can send a format string that allows the attacker to execute arbitrary code on the victim's system.

Extended Description

It is reported that rlpr is prone to multiple vulnerabilities. These vulnerabilities can allow a remote attacker to execute arbitrary code in order to gain unauthorized access. The application is affected by a format string vulnerability. This vulnerability presents itself due to insufficient sanitization of user-supplied data through the 'msg()' function. The 'msg()' function is also affected by a buffer overflow vulnerability. This issue occurs due to insufficient boundary checking and may also be exploited to gain unauthorized access to a vulnerable computer. rlpr versions 2.04 and prior are affected by these issues.

Affected Products

  • rlpr 2.0.0
  • rlpr 2.0.0 1
  • rlpr 2.0.0 2
  • rlpr 2.0.0 3
  • rlpr 2.0.0 4

References

  • BugTraq: 10578
  • CVE: CVE-2004-0393

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out