Rule:

--
Sid:
3544

--
Summary:
This event is generated when an attempt is made to exploit a buffer
overflow associated with the TrackerCam web cam software.

--
Impact:
A successful attack can permit a directory traversal and navigation or
execution of software that is not in the webroot directory.

--
Detailed Information:
A vulnerability exists in the TrackerCam webcam HTTP server. It is
possible for a user to escape the authorized webroot directory. This
can permit an attacker to view or execute files that are not in the
authorized directory.

--
Affected Systems:
	TrackerCam 5.12

--
Attack Scenarios:
An attacker can craft a request to traverse the default webroot directory.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the most current non-affected version of the product.

--
Contributors:
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References

Other:
http://aluigi.altervista.org/adv/tcambof-adv.txt
--
