1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Attack: Borland CaliberRM CVE-2008-0311

Attack: Borland CaliberRM CVE-2008-0311

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts of buffer-overflow exploitation in Borland StarTeam Multicast Service.

Additional Information

Borland CaliberRM is an application for managing software requirements for enterprises. It is available for Microsoft Windows. Borland StarTeam Multicast is a multicast service built on the HTTP protocol. The service listens on TCP port 3057 by default.

Borland StarTeam Multicast Service is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary-checks on user-supplied data. The vulnerability occurs in the 'GMWebHandler::parse_request()' function.

An attacker can exploit this issue by constructing and submitting a malicious payload via TCP port 3057. If the data is large enough, the return address and other stack data will be overrun with attacker-supplied data.

Successfully exploiting this issue will allow attackers to execute arbitrary code with SYSTEM-level privileges, facilitating in the complete compromise of affected computers. Failed exploit attempts will cause a denial-of-service condition.

This issue affects Borland StarTeam Multicast Service 6.4 included in Borland CaliberRM 2006, 2007, and 2008. Other Borland products may also be affected.

Affected

  • Borland CaliberRM 2006, 2007, and 2008

Response

Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube