RabidHamster.R4.Log.Entry.Sprintf.Buffer.Overflow
Description
This indicates an attack attempt against a Buffer Overflow vulnerability in RabidHamster R4.
The vulnerability is due to an input validation error when handling a malicious URI. It allows a remote attacker to execute arbitrary code by sending a crafted HTTP request to a vulnerable server.
Affected Products
RabidHamster R4 1.25
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are not aware of any vendor supplied patch for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |