Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Tries to crash ESA Syslog Server with a long argument to DELETERDEPDEVICE command
Detailed Explanation for this Vulnerability Assessment
The remote host contains an application that is vulnerable to remote
buffer overflow attacks.
The version of eIQnetworks Enterprise Security Analyzer, Network
Security Analyzer, or one of its OEM versions installed on the remote
host is affected by multiple stack-based buffer overflows in its
Syslog Service. Using a long argument to any of several commands, an
unauthenticated remote attacker may be able to leverage this issue to
execute arbitrary code on the affected host with LOCAL SYSTEM
See also :
Upgrade to Enterprise Security Analyzer 2.1.14 / Network Security
Analyzer 4.5.4 / OEM software 4.5.4 or later
Network Security Threat Level:
High / CVSS Base Score : 7.0
Networks Security ID: 19165, 19167
Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security
|HP 255 G6 Laptop, AMD A6-9220 2.5GHz, 4GB RAM, 1TB HDD, 15.6", DVDRW, FreeDOS5
|Fantom Drives 1TB External Hard Drive - 7200RPM USB 3.0/3.1 Gen 1 + eSATA + Case
No Discussions have been posted on this vulnerability.