CVE
- Id
- 19942
- CVE No.
- CVE-2006-3838
- Status
- Candidate
- Description
- Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe); (13) GUIADDDEVICE, (14) ADDDEVICE, and (15) DELETEDEVICE commands to the Topology server (Topology.exe); the (15) LICMGR_ADDLICENSE command to the License Manager (EnterpriseSecurityAnalyzer.exe); the (16) TRACE and (17) QUERYMONITOR commands to the Monitoring agent (Monitoring.exe); and possibly other vectors related to the Syslog daemon (syslogserver.exe).
- Phase
- Assigned (20060725)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
183834 | 19942 | CVE-2006-3838 | BUGTRAQ:20060725 TSRT-06-03: eIQnetworks Enterprise Security Analyzer Syslog Server Buffer Overflow Vulnerabilities | View |
183835 | 19942 | CVE-2006-3838 | URL:http://www.securityfocus.com/archive/1/archive/1/441200/100/0/threaded | View |
183836 | 19942 | CVE-2006-3838 | BUGTRAQ:20060725 TSRT-06-04: eIQnetworks Enterprise Security Analyzer Topology Server Buffer Overflow Vulnerability | View |
183837 | 19942 | CVE-2006-3838 | URL:http://www.securityfocus.com/archive/1/archive/1/441198/100/0/threaded | View |
183838 | 19942 | CVE-2006-3838 | BUGTRAQ:20060808 TSRT-06-07: eIQnetworks Enterprise Security Analyzer Monitoring Agent Buffer Overflow Vulnerabilities | View |
183839 | 19942 | CVE-2006-3838 | URL:http://archive.cert.uni-stuttgart.de/bugtraq/2006/08/msg00152.html | View |
183840 | 19942 | CVE-2006-3838 | BUGTRAQ:20060725 ZDI-06-023: eIQNetworks Enterprise Security Analyzer Syslog Server Buffer Overflow Vulnerability | View |
183841 | 19942 | CVE-2006-3838 | URL:http://www.securityfocus.com/archive/1/archive/1/441197/100/0/threaded | View |
183842 | 19942 | CVE-2006-3838 | BUGTRAQ:20060725 ZDI-06-024: eIQNetworks Enterprise Security Analyzer License Manager Buffer Overflow Vulnerability | View |
183843 | 19942 | CVE-2006-3838 | URL:http://www.securityfocus.com/archive/1/archive/1/441195/100/0/threaded | View |
183844 | 19942 | CVE-2006-3838 | MISC:http://www.tippingpoint.com/security/advisories/TSRT-06-04.html | View |
183845 | 19942 | CVE-2006-3838 | MISC:http://www.tippingpoint.com/security/advisories/TSRT-06-07.html | View |
183846 | 19942 | CVE-2006-3838 | MISC:http://www.zerodayinitiative.com/advisories/ZDI-06-023.html | View |
183847 | 19942 | CVE-2006-3838 | MISC:http://www.zerodayinitiative.com/advisories/ZDI-06-024.html | View |
183848 | 19942 | CVE-2006-3838 | CONFIRM:http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf | View |
183849 | 19942 | CVE-2006-3838 | MISC:http://www.tippingpoint.com/security/advisories/TSRT-06-03.html | View |
183850 | 19942 | CVE-2006-3838 | CERT-VN:VU#513068 | View |
183851 | 19942 | CVE-2006-3838 | URL:http://www.kb.cert.org/vuls/id/513068 | View |
183852 | 19942 | CVE-2006-3838 | BID:19163 | View |
183853 | 19942 | CVE-2006-3838 | URL:http://www.securityfocus.com/bid/19163 | View |
183854 | 19942 | CVE-2006-3838 | BID:19164 | View |
183855 | 19942 | CVE-2006-3838 | URL:http://www.securityfocus.com/bid/19164 | View |
183856 | 19942 | CVE-2006-3838 | BID:19165 | View |
183857 | 19942 | CVE-2006-3838 | URL:http://www.securityfocus.com/bid/19165 | View |
183858 | 19942 | CVE-2006-3838 | BID:19167 | View |
183859 | 19942 | CVE-2006-3838 | URL:http://www.securityfocus.com/bid/19167 | View |
183860 | 19942 | CVE-2006-3838 | VUPEN:ADV-2006-2985 | View |
183861 | 19942 | CVE-2006-3838 | URL:http://www.vupen.com/english/advisories/2006/2985 | View |
183862 | 19942 | CVE-2006-3838 | VUPEN:ADV-2006-3007 | View |
183863 | 19942 | CVE-2006-3838 | URL:http://www.vupen.com/english/advisories/2006/3007 | View |
183864 | 19942 | CVE-2006-3838 | VUPEN:ADV-2006-3010 | View |
183865 | 19942 | CVE-2006-3838 | URL:http://www.vupen.com/english/advisories/2006/3010 | View |
183866 | 19942 | CVE-2006-3838 | VUPEN:ADV-2006-3006 | View |
183867 | 19942 | CVE-2006-3838 | URL:http://www.vupen.com/english/advisories/2006/3006 | View |
183868 | 19942 | CVE-2006-3838 | VUPEN:ADV-2006-3008 | View |
183869 | 19942 | CVE-2006-3838 | URL:http://www.vupen.com/english/advisories/2006/3008 | View |
183870 | 19942 | CVE-2006-3838 | VUPEN:ADV-2006-3009 | View |
183871 | 19942 | CVE-2006-3838 | URL:http://www.vupen.com/english/advisories/2006/3009 | View |
183872 | 19942 | CVE-2006-3838 | OSVDB:27525 | View |
183873 | 19942 | CVE-2006-3838 | URL:http://www.osvdb.org/27525 | View |
183874 | 19942 | CVE-2006-3838 | OSVDB:27526 | View |
183875 | 19942 | CVE-2006-3838 | URL:http://www.osvdb.org/27526 | View |
183876 | 19942 | CVE-2006-3838 | OSVDB:27527 | View |
183877 | 19942 | CVE-2006-3838 | URL:http://www.osvdb.org/27527 | View |
183878 | 19942 | CVE-2006-3838 | OSVDB:27528 | View |
183879 | 19942 | CVE-2006-3838 | URL:http://www.osvdb.org/27528 | View |
183880 | 19942 | CVE-2006-3838 | SECTRACK:1016580 | View |
183881 | 19942 | CVE-2006-3838 | URL:http://securitytracker.com/id?1016580 | View |
183882 | 19942 | CVE-2006-3838 | SECUNIA:21211 | View |
183883 | 19942 | CVE-2006-3838 | URL:http://secunia.com/advisories/21211 | View |
183884 | 19942 | CVE-2006-3838 | SECUNIA:21213 | View |
183885 | 19942 | CVE-2006-3838 | URL:http://secunia.com/advisories/21213 | View |
183886 | 19942 | CVE-2006-3838 | SECUNIA:21217 | View |
183887 | 19942 | CVE-2006-3838 | URL:http://secunia.com/advisories/21217 | View |
183888 | 19942 | CVE-2006-3838 | SECUNIA:21214 | View |
183889 | 19942 | CVE-2006-3838 | URL:http://secunia.com/advisories/21214 | View |
183890 | 19942 | CVE-2006-3838 | SECUNIA:21215 | View |
183891 | 19942 | CVE-2006-3838 | URL:http://secunia.com/advisories/21215 | View |
183892 | 19942 | CVE-2006-3838 | SECUNIA:21218 | View |
183893 | 19942 | CVE-2006-3838 | URL:http://secunia.com/advisories/21218 | View |
183894 | 19942 | CVE-2006-3838 | XF:eiqnetworks-esa-syslog-string-bo(27950) | View |
183895 | 19942 | CVE-2006-3838 | URL:http://xforce.iss.net/xforce/xfdb/27950 | View |
183896 | 19942 | CVE-2006-3838 | XF:eiqnetworks-esa-monitoring-bo(27954) | View |
183897 | 19942 | CVE-2006-3838 | URL:http://xforce.iss.net/xforce/xfdb/27954 | View |
183898 | 19942 | CVE-2006-3838 | XF:eiqnetworks-esa-licensemanager-bo(27952) | View |
183899 | 19942 | CVE-2006-3838 | URL:http://xforce.iss.net/xforce/xfdb/27952 | View |
183900 | 19942 | CVE-2006-3838 | XF:eiqnetworks-esa-syslog-command-bo(27951) | View |
183901 | 19942 | CVE-2006-3838 | URL:http://xforce.iss.net/xforce/xfdb/27951 | View |
183902 | 19942 | CVE-2006-3838 | XF:eiqnetworks-esa-topology-bo(27953) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
58262 | JVNDB-2006-000458 | ISS 製品の SMB Mailslot 解析におけるサービス運用妨害 (DoS) の脆弱性 | ISS 製品には、2006 年 7 月リリースの XPU に含まれる "SMB_MailSlot_Heap_Overflow" デコードに不備があり、特定の正当な SMB Mailslot トラフィックを解析した場合に、Protocol Analysis Module (PAM) エンジンが以後のトラフィックに応答しなくなり、サービス運用妨害 (DoS) 状態となる脆弱性が存在します。 | CVE-2006-3840 | 19942 | 5 | http://jvndb.jvn.jp/ja/contents/2006/JVNDB-2006-000458.html | View |