Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to crash the CSADMIN module only (denial of service of administration function) or execute arbitrary code via format strings in the URL to port 2002.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=101787248913611&w=2 - | |
References | () http://www.cisco.com/warp/public/707/ACS-Win-Web.shtml - Patch, Vendor Advisory | |
References | () http://www.iss.net/security_center/static/8742.php - | |
References | () http://www.osvdb.org/2062 - | |
References | () http://www.securityfocus.com/bid/4416 - |
Information
Published : 2002-04-22 04:00
Updated : 2024-11-20 23:38
NVD link : CVE-2002-0159
Mitre link : CVE-2002-0159
CVE.ORG link : CVE-2002-0159
JSON object : View
Products Affected
cisco
- secure_access_control_server
CWE
CWE-134
Use of Externally-Controlled Format String