Описание
The command ipfilter in Brocade Fabric OS before Brocade Fabric OS v.9.0.1a, v8.2.3, and v8.2.0_CBN4, and v7.4.2h uses unsafe string function to process user input. Authenticated attackers can abuse this vulnerability to exploit stack-based buffer overflows, allowing execution of arbitrary code as the root user account.
Ссылки
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 7.4.2h (исключая)Версия от 8.0.0 (включая) до 8.2.0_cbn4 (исключая)Версия от 8.2.1 (включая) до 8.2.3 (исключая)Версия от 9.0.0 (включая) до 9.0.1a (исключая)
Одно из
cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*
EPSS
Процентиль: 15%
0.00049
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
The command “ipfilter” in Brocade Fabric OS before Brocade Fabric OS v.9.0.1a, v8.2.3, and v8.2.0_CBN4, and v7.4.2h uses unsafe string function to process user input. Authenticated attackers can abuse this vulnerability to exploit stack-based buffer overflows, allowing execution of arbitrary code as the root user account.
EPSS
Процентиль: 15%
0.00049
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-787