Cisco User-Changeable Password Remote Buffer Overflow Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Cisco User-Changeable Password (UCP), which could be exploited by remote attackers to execute arbitrary scripting code, cause a denial of service or take complete control of an affected system.
1. Due to a buffer overflow errors in the HTTP interface when processing overly long arguments (e.g. "Logout", "Main", or "ChangePass") passed to the "CSuserCGI.exe" script, which could be exploited by remote unauthenticated attackers to crash an affected application or execute arbitrary code.
2. Due to an input validation error in the HTTP interface when processing the "Help" parameter passed to the "CSuserCGI.exe" script, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected application.
Impact
- Denial of Service
- Remote Code Execution
System / Technologies affected
- Cisco User-Changeable Password (UCP) versions prior to 4.2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Upgrade to Cisco User-Changeable Password (UCP) version 4.2 :
http://www.cisco.com/warp/public/707/cisco-sa-20080312-ucp.shtml#software
Vulnerability Identifier
Source
Related Link
Share with