Eeye IRIS Buffer Overflow Vulnerability

BID:1627

Info

Eeye IRIS Buffer Overflow Vulnerability

Bugtraq ID: 1627
Class: Boundary Condition Error
CVE: CVE-2000-0734
Remote: Yes
Local: Yes
Published: Aug 31 2000 12:00AM
Updated: Jul 11 2009 02:56AM
Credit: This vulnerability was posted to the Bugtraq mailing list by Underground Security Systems Research (USSR Labs) on August 31, 2000.
Vulnerable: SpyNet CaptureNet 3.0.12
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows NT 4.0
eEye Digital Security IRIS 1.0.1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows NT 4.0
Not Vulnerable:

Discussion

Eeye IRIS Buffer Overflow Vulnerability

IRIS from eEye Digital Security is a protocol analyzer geared towards network management, it is currently in BETA. This product was formerly known as SpyNet CaptureNet. Certain versions of the this software are vulnerable to a remotely triggered buffer overflow attack. This attack is orchestrated by a malicious user launching multiple UDP sessions to random ports on the machine which IRIS resides on (and is in operation on). The net result of this buffer overflow is that the product ceases to function and may drive system resources to 100% before exiting. It may be possible that this overflow (a heap overflow according to the attached advisory) could result in a system compromise. No information indicating that this is the case has been released.

Exploit / POC

Eeye IRIS Buffer Overflow Vulnerability

x

Solution / Fix

Eeye IRIS Buffer Overflow Vulnerability

Solution:
The vendor has provided both a statement on this issue (attached in the 'Credit' section) and a work around:

" The problem triggered by this "DoS" seems to result from filling packet buffers faster than Windows can paint them to the screen. If you are really worried about this, until Iris is out of beta and fixes the "problem", then we recommend you turn off Iris's Capture packet display feature and use Iris's decode view instead."

References

Eeye IRIS Buffer Overflow Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report