7.9 High
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.31 Low
EPSS
Percentile
97.0%
Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, © Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe); (13) GUIADDDEVICE, (14) ADDDEVICE, and (15) DELETEDEVICE commands to the Topology server (Topology.exe); the (15) LICMGR_ADDLICENSE command to the License Manager (EnterpriseSecurityAnalyzer.exe); the (16) TRACE and (17) QUERYMONITOR commands to the Monitoring agent (Monitoring.exe); and possibly other vectors related to the Syslog daemon (syslogserver.exe).
CPE | Name | Operator | Version |
---|---|---|---|
eiqnetworks:enterprise_security_analyzer | eiqnetworks enterprise security analyzer | le | 2.4.0 |
archive.cert.uni-stuttgart.de/bugtraq/2006/08/msg00152.html
secunia.com/advisories/21211
secunia.com/advisories/21213
secunia.com/advisories/21214
secunia.com/advisories/21215
secunia.com/advisories/21217
secunia.com/advisories/21218
securitytracker.com/id?1016580
www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf
www.kb.cert.org/vuls/id/513068
www.osvdb.org/27525
www.osvdb.org/27526
www.osvdb.org/27527
www.osvdb.org/27528
www.securityfocus.com/archive/1/441195/100/0/threaded
www.securityfocus.com/archive/1/441197/100/0/threaded
www.securityfocus.com/archive/1/441198/100/0/threaded
www.securityfocus.com/archive/1/441200/100/0/threaded
www.securityfocus.com/bid/19163
www.securityfocus.com/bid/19164
www.securityfocus.com/bid/19165
www.securityfocus.com/bid/19167
www.tippingpoint.com/security/advisories/TSRT-06-03.html
www.tippingpoint.com/security/advisories/TSRT-06-04.html
www.tippingpoint.com/security/advisories/TSRT-06-07.html
www.vupen.com/english/advisories/2006/2985
www.vupen.com/english/advisories/2006/3006
www.vupen.com/english/advisories/2006/3007
www.vupen.com/english/advisories/2006/3008
www.vupen.com/english/advisories/2006/3009
www.vupen.com/english/advisories/2006/3010
www.zerodayinitiative.com/advisories/ZDI-06-023.html
www.zerodayinitiative.com/advisories/ZDI-06-024.html
exchange.xforce.ibmcloud.com/vulnerabilities/27950
exchange.xforce.ibmcloud.com/vulnerabilities/27951
exchange.xforce.ibmcloud.com/vulnerabilities/27952
exchange.xforce.ibmcloud.com/vulnerabilities/27953
exchange.xforce.ibmcloud.com/vulnerabilities/27954