Vulnerability Note VU#477604

Juniper Networks IVE client ActiveX control buffer overflow

Original Release date: 04 May 2006 | Last revised: 04 May 2006

Overview

The ActiveX control used by Juniper IVE OS devices contains a buffer overflow, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable client.

Description

Juniper IVE OS is an operating system used by Juniper devices, such as the Juniper Networks Secure Access SSL VPN units. The IVE client software includes an ActiveX control, which is used to allow an Internet Explorer client system to connect to the IVE server. The ActiveX control provided by IVE OS contains a buffer overflow vulnerability.

Impact

By convincing a user to view a specially crafted HTML document (e.g., a web page, an HTML email message, or an HTML email attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause Internet Explorer (or the program using the WebBrowser control) to crash.

Solution

Apply an update

Update the IVE software, as specified in Juniper alert PSN-2006-03-013. Note that all client systems must have the updated version of the Juniper ActiveX control installed in order to be protected against this vulnerability.


Disable ActiveX

Disabling ActiveX controls in the Internet Zone (or any zone used by an attacker) appears to prevent exploitation of this vulnerability. Instructions for disabling ActiveX in the Internet Zone can be found in the "Securing Your Web Browser" document and the Malicious Web Scripts FAQ.

Note that disabling ActiveX controls in the Internet Zone will reduce the functionality of some web sites. Putting the IVE server address in a zone that has ActiveX enabled, such as Trusted Sites, will retain IVE functionality.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Juniper Networks, Inc.Affected-02 May 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported by Yuji Ukai of eEye.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2006-2086
  • Date Public: 26 Apr 2006
  • Date First Published: 04 May 2006
  • Date Last Updated: 04 May 2006
  • Severity Metric: 14.22
  • Document Revision: 9

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.