Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SHELLCODE:X86:X90-NOOP-HTTP-REQ

Severity

Critical

Recommended

Yes

Recommended Action

Drop

Category

SHELLCODE

Keywords

x86 Intel Architecture Instruction Set NOOP Slide (HTTP-Request)

Release Date

2003/08/20

Update Number

1213

Supported Platforms

di-5.3+, idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SHELLCODE: x86 Intel Architecture Instruction Set NOOP Slide (HTTP-Request)


This signature detects attempts to exploit a known vulnerability against Web servers on Intel x86 platforms. Attackers can use the "No-Op Slide" attack to pad the stack with "No Operation" x86 CPU instructions and overwrite the return address. A successful attack might allow arbitrary code execution.

Extended Description

Versions 2.6, 7, and 8 of Sun Microsystem's Solaris operating environment ship with service called 'snmpXdmid'. This daemon is used to map SNMP management requests to DMI requests and vice versa. SnmpXdmid contains a remotely exploitable buffer overflow vulnerability. The overflow occurs when snmpXdmid attempts to translate a 'malicious' DMI request into an SNMP trap. SnmpXdmid runs with root privileges and any attacker to successfully exploit this vulnerability will gain superuser access immediately.

Affected Products

  • Sun Solaris 2.6
  • Sun Solaris 2.6_x86
  • Sun Solaris 7.0
  • Sun Solaris 7.0_x86
  • Sun Solaris 8 Sparc
  • Sun Solaris 8 X86

References

  • BugTraq: 2417
  • CVE: CVE-2002-1549
  • CVE: CVE-2001-0236
  • URL: http://encyclopedia.thefreedictionary.com/NOP
  • URL: http://www.sans.org/resources/idfaq/polymorphic_shell.php
  • URL: http://www.security-forums.com/forum/viewtopic.php?p=190843

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out