A vulnerability in the firmware signature checking program of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient checking of an input buffer. An attacker could exploit this vulnerability by passing a crafted file to the affected system. A successful exploit could inhibit an administrator's ability to access the system.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/108846 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-frmwr-dos | Vendor Advisory |
http://www.securityfocus.com/bid/108846 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-frmwr-dos | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/108846 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-imc-frmwr-dos - Vendor Advisory |
Information
Published : 2019-06-20 03:15
Updated : 2024-11-21 04:36
NVD link : CVE-2019-1630
Mitre link : CVE-2019-1630
CVE.ORG link : CVE-2019-1630
JSON object : View
Products Affected
cisco
- unified_computing_system
- integrated_management_controller
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer