This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This Signature detects attempts to cause buffer overflow in the Serv-U Web Client.
RhinoSoft Serv-U Web Client is a browser-based application for transferring files.
The application is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The issue occurs when handling overly long session cookies.
Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Serv-U Web Client 188.8.131.52 is vulnerable; other versions prior to Serv-U Web Client 184.108.40.206 may also be affected.
- RhinoSoft Serv-U Web Client
Updates are available. Please see the references for details.