Buffer overflow in A10 Networks Advanced Core Operating System (ACOS) before 2.7.0-p6 and 2.7.1 before 2.7.1-P1_55 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long session id in the URI to sys_reboot.html. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/show/osvdb/105354 - | |
References | () http://packetstormsecurity.com/files/125979/A10-Networks-ACOS-2.7.0-P2-Buffer-Overflow.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2014/Apr/16 - Exploit | |
References | () http://secunia.com/advisories/57640 - | |
References | () http://www.exploit-db.com/exploits/32702 - Exploit | |
References | () http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax - Exploit | |
References | () http://www.securityfocus.com/bid/66588 - |
Information
Published : 2014-06-05 17:55
Updated : 2024-11-21 02:09
NVD link : CVE-2014-3976
Mitre link : CVE-2014-3976
CVE.ORG link : CVE-2014-3976
JSON object : View
Products Affected
a10networks
- advanced_core_operating_system
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer