1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Web Attack: ServU Web Client Http Request BO

Web Attack: ServU Web Client Http Request BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This Signature detects attempts to cause buffer overflow in the Serv-U Web Client.

Additional Information

RhinoSoft Serv-U Web Client is a browser-based application for transferring files.

The application is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. The issue occurs when handling overly long session cookies.

Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

Serv-U Web Client 9.0.0.5 is vulnerable; other versions prior to Serv-U Web Client 9.1.0.0 may also be affected.

Affected

  • RhinoSoft Serv-U Web Client

Response

Updates are available. Please see the references for details.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube