CERTA-2010-AVI-539

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités affectent Cisco Intelligent Contact Manager et permettent à un attaquant d'exécuter du code arbitraire à distance.

Description

Plusieurs vecteurs d'attaque, utilisant chacun une erreur dans la vérification de la taille des entrées, conduisent à des débordements de tampon dans le tas. Leur exploitation réussie permet l'exécution de code arbitraire à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Cisco Intelligent Contact Manager versions antérieures à 7.0.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eCisco Intelligent Contact Manager versions ant\u00e9rieures \u00e0  7.0.\u003c/P\u003e",
  "content": "## Description\n\nPlusieurs vecteurs d\u0027attaque, utilisant chacun une erreur dans la\nv\u00e9rification de la taille des entr\u00e9es, conduisent \u00e0 des d\u00e9bordements de\ntampon dans le tas. Leur exploitation r\u00e9ussie permet l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2010-3040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-3040"
    }
  ],
  "links": [
    {
      "title": "Alerte de vuln\u00e9rabilit\u00e9 Cisco n\u00b021726 du 3 novembre 2010",
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=21726"
    }
  ],
  "reference": "CERTA-2010-AVI-539",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-11-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s affectent \u003cspan class=\"textit\"\u003eCisco\nIntelligent Contact Manager\u003c/span\u003e et permettent \u00e0 un attaquant\nd\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Cisco Intelligent Contact Manager",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Alerte de vuln\u00e9rabilit\u00e9 Cisco n\u00b0 21726 du 03 novembre 2010",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…