Stack-based buffer overflow in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allows remote attackers to execute arbitrary code via a crafted RADIUS Accounting-Request packet.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/36126 - | |
References | () http://secunia.com/advisories/23629 - Vendor Advisory | |
References | () http://securitytracker.com/id?1017475 - | |
References | () http://www.cisco.com/warp/public/707/cisco-sa-20070105-csacs.shtml - | |
References | () http://www.kb.cert.org/vuls/id/477164 - US Government Resource | |
References | () http://www.securityfocus.com/bid/21900 - | |
References | () http://www.vupen.com/english/advisories/2007/0068 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31327 - |
Information
Published : 2006-12-31 05:00
Updated : 2024-11-21 00:15
NVD link : CVE-2006-4098
Mitre link : CVE-2006-4098
CVE.ORG link : CVE-2006-4098
JSON object : View
Products Affected
cisco
- secure_access_control_server
CWE