Short Name |
WHOIS:UNEXPECTED-REPLY |
---|---|
Severity |
Low |
Recommended |
No |
Category |
WHOIS |
Release Date |
2004/01/29 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This protocol anomaly is a reply from the server before a request was seen from the client.
A remote attacker could craft a WHOIS reply message to scan a remote host. The application processing the packet could fail because of the exceptional condition. The impact depends on the implementation of the protocols, which could include a buffer overflow, disclosure of sensitive information, denial of service, or execution of arbitrary code.