Rule:

--
Sid:
3546

--
Summary:
This event is generated when an attempt is made to exploit a buffer
overflow associated with the TrackerCam web cam software.

--
Impact:
A successful attack can cause a buffer overflow on a vulnerable
TrackerCam web server.

--
Detailed Information:
A vulnerability exists in the TrackerCam webcam HTTP server. The value
supplied to the User-Agent header request sent by the client is written
to a fixed-size buffer. An overly long value can cause a buffer overflow
and the subsequent execution of arbitrary code on a vulnerable server.

--
Affected Systems:
	TrackerCam 5.12

--
Attack Scenarios:
An attacker can craft a request with an overly long value for the
User-Agent header, causing a buffer overflow.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the most current non-affected version of the product.

--
Contributors:
Sourcefire Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References

Other:
http://aluigi.altervista.org/adv/tcambof-adv.txt
--
