Rule:

--
Sid:
3816

--
Summary:
This event is generated when an attempt is made to exploit a vulnerability
associated with BadBlue web server.

--
Impact:
Serious. Execution of arbitrary commands may be possible.

--
Detailed Information:
A vulnerability exists in the BadBlue web server when the ext.dll is
called and the mfcisapicommand parameter is passed an overly long
value.  This may cause a buffer overflow and the subsequent execution
of arbitrary commands on a vulnerable server.

--
Affected Systems:
	BadBlue 2.5

--
Attack Scenarios:
An attacker can send an HTTP request for ext.dll and supply the
mfcisapicommand parameter a very long value.

--
Ease of Attack:
Simple.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the most current nonaffected version of the software.

--
Contributors:
Sourcefire Vulnerability Research Team
Judy Novak <judy.novak@sourcefire.com>

--
Additional References:

--
