Intrusion Prevention

Barracuda.Spam.Firewall.Imgpl.Command.Execution

Description

This indicates an attack attempt against a Remote Code Execution vulnerability in Barracuda Spam Firewall.
This is due to filters for user inputs failing to properly sanitize the f parameter value that is passed to "img.pl". An attacker may include shell commands by supplying an injection string through the URL.

Affected Products

Barracuda Networks Barracuda Spam Firewall 3.1.17 firmware.

Impact

System Compromise: Remote attackers can gain control of vulnerable systems

Recommended Actions

Upgrade to Barracuda Spam Firewall 3.1.18.

CVE References

CVE-2005-2848 CVE-2005-2847