Short Name |
RPC:RLPR-FS |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
RPC |
Keywords |
RLPR Daemon Format String |
Release Date |
2006/02/21 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the RLPR daemon syslog logging function. A successful attacker can send a format string that allows the attacker to execute arbitrary code on the victim's system.
It is reported that rlpr is prone to multiple vulnerabilities. These vulnerabilities can allow a remote attacker to execute arbitrary code in order to gain unauthorized access. The application is affected by a format string vulnerability. This vulnerability presents itself due to insufficient sanitization of user-supplied data through the 'msg()' function. The 'msg()' function is also affected by a buffer overflow vulnerability. This issue occurs due to insufficient boundary checking and may also be exploited to gain unauthorized access to a vulnerable computer. rlpr versions 2.04 and prior are affected by these issues.