Borland CaliberRM StarTeam Multicast Service Buffer Overflow
From local network
Software:Borland CaliberRM 2006Borland CaliberRM 2008CVE reference:CVE-2008-0311 (Secunia mirror)
This advisory is currently marked as unpatched! - Companies can be alerted when a patch is released!
Description:A vulnerability has been reported in Borland
CaliberRM, which can be exploited by malicious people to compromise a
The vulnerability is caused due to a boundary error within
"PGMWebHandler::parse_request()" in the StarTeam Multicast Service
component (STMulticastService). This can be exploited to cause a
stack-based buffer overflow via an overly long HTTP request sent to
default port 3057/TCP.
Successful exploitation allows execution of arbitrary code but requires
that the StarTeam Multicast service is installed by enabling MPX Events
and StarTeam Message Broker options during installation.
The vulnerability is reported in Borland CaliberRM 2006 and 2008. Other
versions and products using the affected component may also be affected.Solution:Restrict network access to the service.
Affected users can also disable the listening port.
http://support.borland.com/kbshow.php?q=29083Provided and/or discovered by:Discovered by an anonymous researcher and reported via iDefense Labs.Original Advisory:iDefense Labs: