| Title | Cisco Unified Service Monitor における任意のコードを実行される脆弱性 |
|---|---|
| Summary | Cisco Unified Operations Manager および CiscoWorks LAN Management Solution で使用される Cisco Unified Service Monitor には、任意のコードを実行される脆弱性が存在します。 本問題は、Bug ID CSCtn42961 および CSCtn64922 の問題です。 |
| Possible impacts | 第三者により、巧妙に細工された TCP ポート 9002 のパケットを介して、任意のコードを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Sept. 14, 2011, midnight |
| Registration Date | Sept. 22, 2011, 3:55 p.m. |
| Last Update | Sept. 22, 2011, 3:55 p.m. |
| CVSS2.0 : 危険 | |
| Score | 10 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
| シスコシステムズ |
| Cisco Unified Operations Manager 8.6 未満 |
| Cisco Unified Service Monitor |
| CiscoWorks LAN Management Solution (LMS) 4.1 未満の 3.x および 4.x |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2011年09月22日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used in Unified Operations Manager before 8.6 and CiscoWorks LAN Management Solution 3.x and 4.x before 4.1; and multiple EMC Ionix products including Application Connectivity Monitor (Ionix ACM) 2.3 and earlier, Adapter for Alcatel-Lucent 5620 SAM EMS (Ionix ASAM) 3.2.0.2 and earlier, IP Management Suite (Ionix IP) 8.1.1.1 and earlier, and other Ionix products; allow remote attackers to execute arbitrary code via crafted packets to TCP port 9002, aka Bug IDs CSCtn42961 and CSCtn64922, related to a buffer overflow. |
|---|---|
| Publication Date | Sept. 19, 2011, 9:02 p.m. |
| Registration Date | Jan. 28, 2021, 4:39 p.m. |
| Last Update | Nov. 21, 2024, 10:28 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:cisco:unified_service_monitor:*:*:*:*:*:*:*:* | 8.5 | ||||
| cpe:2.3:a:cisco:unified_service_monitor:1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_service_monitor:2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_service_monitor:2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_service_monitor:2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_service_monitor:2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_service_monitor:2.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_service_monitor:8.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:december_2007:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:ciscoworks_lan_management_solution:4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:ciscoworks_lan_management_solution:4.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_operations_manager:*:*:*:*:*:*:*:* | 8.5 | ||||
| cpe:2.3:a:cisco:unified_operations_manager:1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_operations_manager:1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_operations_manager:2.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_operations_manager:2.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_operations_manager:2.0.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_operations_manager:2.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_operations_manager:2.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_operations_manager:2.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_operations_manager:2.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:cisco:unified_operations_manager:8.0:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:emc:ionix_ip:*:*:*:*:*:*:*:* | 8.1.1.1 | ||||
| cpe:2.3:a:emc:ionix_acm:*:*:*:*:*:*:*:* | 2.3 | ||||
| cpe:2.3:a:emc:ionix_asam:*:*:*:*:*:*:*:* | 3.2.0.2 | ||||