Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SHELLCODE:MSF:DCX86-80S

Severity

Critical

Recommended

Yes

Recommended Action

Drop

Category

SHELLCODE

Keywords

Metasploit Decoder Routine for X86 HTTP-STC

Release Date

2013/09/30

Update Number

2303

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SHELLCODE: Metasploit Decoder Routine for X86 HTTP-STC


This signature detect payloads being transferred over HTTP protocol that have been encoded using Metasploit X86 encoder routine. This could be an indication that the session is an attack coming from a Metasploit attacker.

Extended Description

BACnet OPC Client is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.

Affected Products

  • SCADA Engine BACnet OPC Client

References

  • BugTraq: 43289
  • BugTraq: 42154
  • CVE: CVE-2010-2709

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out