Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe); (13) GUIADDDEVICE, (14) ADDDEVICE, and (15) DELETEDEVICE commands to the Topology server (Topology.exe); the (15) LICMGR_ADDLICENSE command to the License Manager (EnterpriseSecurityAnalyzer.exe); the (16) TRACE and (17) QUERYMONITOR commands to the Monitoring agent (Monitoring.exe); and possibly other vectors related to the Syslog daemon (syslogserver.exe).
References
Configurations
History
21 Nov 2024, 00:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://archive.cert.uni-stuttgart.de/bugtraq/2006/08/msg00152.html - | |
References | () http://secunia.com/advisories/21211 - Vendor Advisory | |
References | () http://secunia.com/advisories/21213 - Vendor Advisory | |
References | () http://secunia.com/advisories/21214 - Vendor Advisory | |
References | () http://secunia.com/advisories/21215 - Vendor Advisory | |
References | () http://secunia.com/advisories/21217 - Vendor Advisory | |
References | () http://secunia.com/advisories/21218 - Vendor Advisory | |
References | () http://securitytracker.com/id?1016580 - | |
References | () http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf - | |
References | () http://www.kb.cert.org/vuls/id/513068 - US Government Resource | |
References | () http://www.osvdb.org/27525 - | |
References | () http://www.osvdb.org/27526 - | |
References | () http://www.osvdb.org/27527 - | |
References | () http://www.osvdb.org/27528 - | |
References | () http://www.securityfocus.com/archive/1/441195/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/441197/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/441198/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/441200/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19163 - | |
References | () http://www.securityfocus.com/bid/19164 - | |
References | () http://www.securityfocus.com/bid/19165 - | |
References | () http://www.securityfocus.com/bid/19167 - | |
References | () http://www.tippingpoint.com/security/advisories/TSRT-06-03.html - Vendor Advisory | |
References | () http://www.tippingpoint.com/security/advisories/TSRT-06-04.html - | |
References | () http://www.tippingpoint.com/security/advisories/TSRT-06-07.html - | |
References | () http://www.vupen.com/english/advisories/2006/2985 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3006 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3007 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3008 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3009 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3010 - Vendor Advisory | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-06-023.html - | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-06-024.html - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27950 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27951 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27952 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27953 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27954 - |
Information
Published : 2006-07-27 01:04
Updated : 2024-11-21 00:14
NVD link : CVE-2006-3838
Mitre link : CVE-2006-3838
CVE.ORG link : CVE-2006-3838
JSON object : View
Products Affected
eiqnetworks
- enterprise_security_analyzer
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer