This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects an attempt to exploit a stack based buffer overflow vulnerability in Enterasys Network Management Suite which could result in remote code execution or cause a denial-of-service.
The application is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data before copying it to an insufficiently sized buffer. Specifically, this issue occurs in the 'nssyslogd.exe' component which listens by default on UDP port 514, when handling a specially-crafted 'PRIO' field of the syslog message.
- Versions prior to Network Management Suite 126.96.36.199 are vulnerable.