This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a buffer overflow vulnerability in ERDAS ER Viewer which could result in remote code execution.
ERDAS ER Viewer is a free, easy-to-use image viewer that enables users to interactively roam and zoom large JPEG 2000 and ECW files.
ERDAS ER Viewer is prone to a stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. Specifically, the issue affects the 'ERM_convert_to_correct_webpath()' function when processing certain file paths. An attacker can exploit this issue through a specially crafted ERS file.
Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of the vulnerable application. Failed exploit attempts likely result in denial-of-service conditions.
- ERDAS ER Viewer 11.0.4 is vulnerable; other versions may also be affected.