Описание
The buffer overflow trigger in Cisco Security Agent (CSA) before 4.0.3 build 728 waits five minutes for a user response before terminating the process, which could allow remote attackers to bypass the buffer overflow protection by sending additional buffer overflow attacks within the five minute timeout period.
Ссылки
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:cisco:security_agent:3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:security_agent:4.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:security_agent:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:security_agent:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:security_agent:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:okena:stormwatch:3.x:*:*:*:*:*:*:*
EPSS
Процентиль: 74%
0.00876
Низкий
5.1 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
The buffer overflow trigger in Cisco Security Agent (CSA) before 4.0.3 build 728 waits five minutes for a user response before terminating the process, which could allow remote attackers to bypass the buffer overflow protection by sending additional buffer overflow attacks within the five minute timeout period.
EPSS
Процентиль: 74%
0.00876
Низкий
5.1 Medium
CVSS2
Дефекты
NVD-CWE-Other