Vulnerabilites related to cisco - qos_policy_manager
Vulnerability from fkie_nvd
Published
2010-10-29 19:00
Modified
2024-11-21 01:17
Severity ?
Summary
Multiple buffer overflows in the authentication functionality in the web-server module in Cisco CiscoWorks Common Services before 4.0 allow remote attackers to execute arbitrary code via a session on TCP port (1) 443 or (2) 1741, aka Bug ID CSCti41352.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ciscoworks_common_services | 3.0.5 | |
cisco | ciscoworks_common_services | 3.0.6 | |
cisco | ciscoworks_common_services | 3.1 | |
cisco | ciscoworks_common_services | 3.1.1 | |
cisco | ciscoworks_common_services | 3.2 | |
cisco | ciscoworks_common_services | 3.3 | |
cisco | ciscoworks_lan_management_solution | 2.6 | |
cisco | ciscoworks_lan_management_solution | 3.0 | |
cisco | ciscoworks_lan_management_solution | 3.0 | |
cisco | ciscoworks_lan_management_solution | 3.1 | |
cisco | ciscoworks_lan_management_solution | 3.2 | |
cisco | qos_policy_manager | 4.0 | |
cisco | qos_policy_manager | 4.0.1 | |
cisco | qos_policy_manager | 4.0.2 | |
cisco | security_manager | 3.0.2 | |
cisco | security_manager | 3.2 | |
cisco | telepresence_readiness_assessment_manager | 1.0 | |
cisco | unified_operations_manager | 2.0.1 | |
cisco | unified_operations_manager | 2.0.2 | |
cisco | unified_operations_manager | 2.0.3 | |
cisco | unified_service_monitor | 2.0.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:ciscoworks_common_services:3.0.5:*:*:*:*:*:*:*", matchCriteriaId: "88AD3EC2-36B1-4E34-BD7F-B1D02B32178A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ciscoworks_common_services:3.0.6:*:*:*:*:*:*:*", matchCriteriaId: "5CC9C408-0BE2-45A6-ACB3-B9EBB22BC773", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ciscoworks_common_services:3.1:*:*:*:*:*:*:*", matchCriteriaId: "499CD64C-8692-4BE7-8F5E-5964ACDA1972", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ciscoworks_common_services:3.1.1:*:*:*:*:*:*:*", matchCriteriaId: "D2152A29-7074-4659-AA8A-BB3E793ED4A6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ciscoworks_common_services:3.2:*:*:*:*:*:*:*", matchCriteriaId: "518309CD-F453-4B0B-8C1D-E534CE0E336B", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ciscoworks_common_services:3.3:*:*:*:*:*:*:*", matchCriteriaId: "22DE1462-59AC-40BE-89DF-AB43CA3EC7BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:2.6:update:*:*:*:*:*:*", matchCriteriaId: "3D8B4ED2-15B4-4FE1-A159-D6435B5DCA5C", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:*:*:*:*:*:*:*", matchCriteriaId: "D6CF9518-2D68-4E95-862B-54B622622B9D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:december_2007:*:*:*:*:*:*", matchCriteriaId: "D81D6312-9A3E-483D-BBFC-C7688B3872A3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.1:*:*:*:*:*:*:*", matchCriteriaId: "2C446E75-5404-4875-AD94-DF953A7874FC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.2:*:*:*:*:*:*:*", matchCriteriaId: "BD8493C0-A3FF-473A-BFD5-DB6051AE8DCC", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:qos_policy_manager:4.0:*:*:*:*:*:*:*", matchCriteriaId: "1BEE8595-B861-4DAB-9708-B2DA30C36C77", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:qos_policy_manager:4.0.1:*:*:*:*:*:*:*", matchCriteriaId: "96C5C060-E09E-4F28-9B87-0417DBFB9368", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:qos_policy_manager:4.0.2:*:*:*:*:*:*:*", matchCriteriaId: "83FCE4EC-B432-4768-BF3A-F1A29BD6B4B3", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:security_manager:3.0.2:*:*:*:*:*:*:*", matchCriteriaId: "2F831EEB-A499-4C76-A085-52F3D750E0FD", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:security_manager:3.2:*:*:*:*:*:*:*", matchCriteriaId: "4686AD6B-CAB3-4CE5-9B13-D30613C614CB", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:telepresence_readiness_assessment_manager:1.0:*:*:*:*:*:*:*", matchCriteriaId: "668AEB8D-4923-4EAE-A67A-979D7B816108", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:unified_operations_manager:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "DD2DF29A-4E30-442C-BB14-F22D955B112A", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:unified_operations_manager:2.0.2:*:*:*:*:*:*:*", matchCriteriaId: "4CA03A21-13EF-476E-892B-D0A494779594", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:unified_operations_manager:2.0.3:*:*:*:*:*:*:*", matchCriteriaId: "107A78CC-8943-4D33-BE60-CBFC72FE405D", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:unified_service_monitor:2.0.1:*:*:*:*:*:*:*", matchCriteriaId: "AA713155-3826-401C-88E6-5D556513877A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple buffer overflows in the authentication functionality in the web-server module in Cisco CiscoWorks Common Services before 4.0 allow remote attackers to execute arbitrary code via a session on TCP port (1) 443 or (2) 1741, aka Bug ID CSCti41352.", }, { lang: "es", value: "Multiples desbordamientos de búfer en la función de autenticación en el módulo web-server de Cisco CiscoWorks Common Services anterior a v4.0 permite a los atacantes remotos ejecutar código a su elección a través de sesiones TCP en el puerto (1) 443 o (2) 1741, también conocido como \"Bug ID CSCti41352\".", }, ], id: "CVE-2010-3036", lastModified: "2024-11-21T01:17:55.163", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2010-10-29T19:00:02.013", references: [ { source: "psirt@cisco.com", url: "http://osvdb.org/68927", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/42011", }, { source: "psirt@cisco.com", url: "http://securitytracker.com/id?1024646", }, { source: "psirt@cisco.com", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b51501.shtml", }, { source: "psirt@cisco.com", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/44468", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2010/2793", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://osvdb.org/68927", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://secunia.com/advisories/42011", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://securitytracker.com/id?1024646", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b51501.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.securityfocus.com/bid/44468", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.vupen.com/english/advisories/2010/2793", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-119", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2010-3036
Vulnerability from cvelistv5
Published
2010-10-29 18:00
Modified
2024-08-07 02:55
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in the authentication functionality in the web-server module in Cisco CiscoWorks Common Services before 4.0 allow remote attackers to execute arbitrary code via a session on TCP port (1) 443 or (2) 1741, aka Bug ID CSCti41352.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/68927 | vdb-entry, x_refsource_OSVDB | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b51501.shtml | vendor-advisory, x_refsource_CISCO | |
http://securitytracker.com/id?1024646 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/44468 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/42011 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2010/2793 | vdb-entry, x_refsource_VUPEN |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T02:55:46.619Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "68927", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://osvdb.org/68927", }, { name: "20101027 CiscoWorks Common Services Arbitrary Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b51501.shtml", }, { name: "1024646", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://securitytracker.com/id?1024646", }, { name: "44468", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/44468", }, { name: "42011", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/42011", }, { name: "ADV-2010-2793", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2010/2793", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2010-10-27T00:00:00", descriptions: [ { lang: "en", value: "Multiple buffer overflows in the authentication functionality in the web-server module in Cisco CiscoWorks Common Services before 4.0 allow remote attackers to execute arbitrary code via a session on TCP port (1) 443 or (2) 1741, aka Bug ID CSCti41352.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2010-11-06T09:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "68927", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://osvdb.org/68927", }, { name: "20101027 CiscoWorks Common Services Arbitrary Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b51501.shtml", }, { name: "1024646", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://securitytracker.com/id?1024646", }, { name: "44468", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/44468", }, { name: "42011", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/42011", }, { name: "ADV-2010-2793", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2010/2793", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2010-3036", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple buffer overflows in the authentication functionality in the web-server module in Cisco CiscoWorks Common Services before 4.0 allow remote attackers to execute arbitrary code via a session on TCP port (1) 443 or (2) 1741, aka Bug ID CSCti41352.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "68927", refsource: "OSVDB", url: "http://osvdb.org/68927", }, { name: "20101027 CiscoWorks Common Services Arbitrary Code Execution Vulnerability", refsource: "CISCO", url: "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b51501.shtml", }, { name: "1024646", refsource: "SECTRACK", url: "http://securitytracker.com/id?1024646", }, { name: "44468", refsource: "BID", url: "http://www.securityfocus.com/bid/44468", }, { name: "42011", refsource: "SECUNIA", url: "http://secunia.com/advisories/42011", }, { name: "ADV-2010-2793", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2010/2793", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2010-3036", datePublished: "2010-10-29T18:00:00", dateReserved: "2010-08-17T00:00:00", dateUpdated: "2024-08-07T02:55:46.619Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }