CNVD-2020-36266

Vulnerability from cnvd - Published: 2020-07-06
VLAI Severity ?
Title
Cisco AMP for Endpoints Linux和Mac Connector Software缓冲区溢出漏洞
Description
Cisco AMP for Endpoints Mac Connector Software和Cisco AMP for Endpoints Linux Connector Software都是美国思科(Cisco)公司的产品。Cisco AMP for Endpoints Mac Connector Software是一套基于macOS平台的集成了静态和动态恶意软件分析以及威胁情报的终端应用程序。该程序可分析恶意软件的行为和意图、威胁的影响程度以及防御方法等。Cisco AMP for Endpoints Linux Connector Software是一套基于Linux平台的集成了静态和动态恶意软件分析以及威胁情报的终端应用程序。该程序可分析恶意软件的行为和意图、威胁的影响程度以及防御方法等。 Cisco AMP for Endpoints Linux Connector 1.12.3.698之前版本和AMP for Endpoints Mac Connector Software 1.12.3.738之前版本中存在缓冲区溢出漏洞,攻击者可通过将特制的数据包发送到受影响的设备利用该漏洞导致Cisco AMP for Endpoints服务崩溃并重新启动。
Severity
Patch Name
Cisco AMP for Endpoints Linux和Mac Connector Software缓冲区溢出漏洞的补丁
Patch Description
Cisco AMP for Endpoints Mac Connector Software和Cisco AMP for Endpoints Linux Connector Software都是美国思科(Cisco)公司的产品。Cisco AMP for Endpoints Mac Connector Software是一套基于macOS平台的集成了静态和动态恶意软件分析以及威胁情报的终端应用程序。该程序可分析恶意软件的行为和意图、威胁的影响程度以及防御方法等。Cisco AMP for Endpoints Linux Connector Software是一套基于Linux平台的集成了静态和动态恶意软件分析以及威胁情报的终端应用程序。该程序可分析恶意软件的行为和意图、威胁的影响程度以及防御方法等。 Cisco AMP for Endpoints Linux Connector 1.12.3.698之前版本和AMP for Endpoints Mac Connector Software 1.12.3.738之前版本中存在缓冲区溢出漏洞,攻击者可通过将特制的数据包发送到受影响的设备利用该漏洞导致Cisco AMP for Endpoints服务崩溃并重新启动。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4elinux-h33dkrvb

Reference
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4elinux-h33dkrvb
Impacted products
Name
['Cisco AMP for Endpoints Linux Connector <1.12.3.698', 'Cisco AMP for Endpoints Mac Connector Software <1.12.3.738']
Show details on source website

{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2020-3344"
    }
  },
  "description": "Cisco AMP for Endpoints Mac Connector Software\u548cCisco AMP for Endpoints Linux Connector Software\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Cisco AMP for Endpoints Mac Connector Software\u662f\u4e00\u5957\u57fa\u4e8emacOS\u5e73\u53f0\u7684\u96c6\u6210\u4e86\u9759\u6001\u548c\u52a8\u6001\u6076\u610f\u8f6f\u4ef6\u5206\u6790\u4ee5\u53ca\u5a01\u80c1\u60c5\u62a5\u7684\u7ec8\u7aef\u5e94\u7528\u7a0b\u5e8f\u3002\u8be5\u7a0b\u5e8f\u53ef\u5206\u6790\u6076\u610f\u8f6f\u4ef6\u7684\u884c\u4e3a\u548c\u610f\u56fe\u3001\u5a01\u80c1\u7684\u5f71\u54cd\u7a0b\u5ea6\u4ee5\u53ca\u9632\u5fa1\u65b9\u6cd5\u7b49\u3002Cisco AMP for Endpoints Linux Connector Software\u662f\u4e00\u5957\u57fa\u4e8eLinux\u5e73\u53f0\u7684\u96c6\u6210\u4e86\u9759\u6001\u548c\u52a8\u6001\u6076\u610f\u8f6f\u4ef6\u5206\u6790\u4ee5\u53ca\u5a01\u80c1\u60c5\u62a5\u7684\u7ec8\u7aef\u5e94\u7528\u7a0b\u5e8f\u3002\u8be5\u7a0b\u5e8f\u53ef\u5206\u6790\u6076\u610f\u8f6f\u4ef6\u7684\u884c\u4e3a\u548c\u610f\u56fe\u3001\u5a01\u80c1\u7684\u5f71\u54cd\u7a0b\u5ea6\u4ee5\u53ca\u9632\u5fa1\u65b9\u6cd5\u7b49\u3002\n\nCisco AMP for Endpoints Linux Connector 1.12.3.698\u4e4b\u524d\u7248\u672c\u548cAMP for Endpoints Mac Connector Software 1.12.3.738\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5c06\u7279\u5236\u7684\u6570\u636e\u5305\u53d1\u9001\u5230\u53d7\u5f71\u54cd\u7684\u8bbe\u5907\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4Cisco AMP for Endpoints\u670d\u52a1\u5d29\u6e83\u5e76\u91cd\u65b0\u542f\u52a8\u3002",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4elinux-h33dkrvb",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2020-36266",
  "openTime": "2020-07-06",
  "patchDescription": "Cisco AMP for Endpoints Mac Connector Software\u548cCisco AMP for Endpoints Linux Connector Software\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Cisco AMP for Endpoints Mac Connector Software\u662f\u4e00\u5957\u57fa\u4e8emacOS\u5e73\u53f0\u7684\u96c6\u6210\u4e86\u9759\u6001\u548c\u52a8\u6001\u6076\u610f\u8f6f\u4ef6\u5206\u6790\u4ee5\u53ca\u5a01\u80c1\u60c5\u62a5\u7684\u7ec8\u7aef\u5e94\u7528\u7a0b\u5e8f\u3002\u8be5\u7a0b\u5e8f\u53ef\u5206\u6790\u6076\u610f\u8f6f\u4ef6\u7684\u884c\u4e3a\u548c\u610f\u56fe\u3001\u5a01\u80c1\u7684\u5f71\u54cd\u7a0b\u5ea6\u4ee5\u53ca\u9632\u5fa1\u65b9\u6cd5\u7b49\u3002Cisco AMP for Endpoints Linux Connector Software\u662f\u4e00\u5957\u57fa\u4e8eLinux\u5e73\u53f0\u7684\u96c6\u6210\u4e86\u9759\u6001\u548c\u52a8\u6001\u6076\u610f\u8f6f\u4ef6\u5206\u6790\u4ee5\u53ca\u5a01\u80c1\u60c5\u62a5\u7684\u7ec8\u7aef\u5e94\u7528\u7a0b\u5e8f\u3002\u8be5\u7a0b\u5e8f\u53ef\u5206\u6790\u6076\u610f\u8f6f\u4ef6\u7684\u884c\u4e3a\u548c\u610f\u56fe\u3001\u5a01\u80c1\u7684\u5f71\u54cd\u7a0b\u5ea6\u4ee5\u53ca\u9632\u5fa1\u65b9\u6cd5\u7b49\u3002\r\n\r\nCisco AMP for Endpoints Linux Connector 1.12.3.698\u4e4b\u524d\u7248\u672c\u548cAMP for Endpoints Mac Connector Software 1.12.3.738\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5c06\u7279\u5236\u7684\u6570\u636e\u5305\u53d1\u9001\u5230\u53d7\u5f71\u54cd\u7684\u8bbe\u5907\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4Cisco AMP for Endpoints\u670d\u52a1\u5d29\u6e83\u5e76\u91cd\u65b0\u542f\u52a8\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Cisco AMP for Endpoints Linux\u548cMac Connector Software\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Cisco AMP for Endpoints Linux Connector \u003c1.12.3.698",
      "Cisco AMP for Endpoints Mac Connector Software \u003c1.12.3.738"
    ]
  },
  "referenceLink": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp4elinux-h33dkrvb",
  "serverity": "\u4f4e",
  "submitTime": "2020-05-14",
  "title": "Cisco AMP for Endpoints Linux\u548cMac Connector Software\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…