Cisco Products Multiple Remote Buffer Overflow Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in various Cisco products, which could be exploited by remote attackers to take complete control of a vulnerable system. These issues are caused by buffer overflow errors in the Cisco developed authentication code in the web server module of CiscoWorks Common Services when processing malformed HTTP or HTTPS requests sent to port 443/TCP or 1741/TCP, which could allow remote unauthenticated attackers to cause the web server to crash or execute arbitrary code with elevated privileges.
Impact
- Remote Code Execution
System / Technologies affected
- CiscoWorks Common Services versions 3.0.5 through 3.3.0
- CiscoWorks QoS Policy Manager version 4.0
- CiscoWorks QoS Policy Manager version 4.0.1
- CiscoWorks QoS Policy Manager version 4.0.2
- CiscoWorks LAN Management Solution version 2.6 Update
- CiscoWorks LAN Management Solution version 3.0
- CiscoWorks LAN Management Solution version 3.0 (December 2007 Update)
- CiscoWorks LAN Management Solution version 3.2
- Cisco Unified Operations Manager version 2.0.1
- Cisco Unified Operations Manager version 2.0.2
- Cisco Unified Operations Manager version 2.0.3
- Cisco Unified Service Monitor version 2.0.1
- Cisco Security Manager version 3.0.2
- Cisco Security Manager version 3.1
- Cisco Security Manager version 3.1.1
- Cisco Security Manager version 3.2
- Cisco TelePresence Readiness Assessment Manager version 1.0
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to CiscoWorks Common Services version 4.0.
Or
Apply patch cwcs33-sol-CSCti41352.tar for Solaris and patch cwcs33-win-CSCti41352.zip for Windows :
http://tools.cisco.com/support/downloads/pub/Redirect.x?mdfid=268439477
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with