Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent Contact Manager (ICM) before 7.0 allow remote attackers to execute arbitrary code via a long parameter in a (1) HandleUpgradeAll, (2) AgentUpgrade, (3) HandleQueryNodeInfoReq, or (4) HandleUpgradeTrace TCP packet, aka Bug IDs CSCti45698, CSCti45715, CSCti45726, and CSCti46164.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent Contact Manager (ICM) before 7.0 allow remote attackers to execute arbitrary code via a long parameter in a (1) HandleUpgradeAll, (2) AgentUpgrade, (3) HandleQueryNodeInfoReq, or (4) HandleUpgradeTrace TCP packet, aka Bug IDs CSCti45698, CSCti45715, CSCti45726, and CSCti46164.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.zerodayinitiative.com/advisories/ZDI-10-233/ | x_refsource_MISC |
http://www.zerodayinitiative.com/advisories/ZDI-10-234/ | x_refsource_MISC |
http://securitytracker.com/id?1024693 | vdb-entry x_refsource_SECTRACK |
http://tools.cisco.com/security/center/viewAlert.x?alertId=21726 | x_refsource_CONFIRM |
http://www.zerodayinitiative.com/advisories/ZDI-10-232/ | x_refsource_MISC |
http://www.vupen.com/english/advisories/2010/2914 | vdb-entry x_refsource_VUPEN |
http://secunia.com/advisories/42146 | third-party-advisory x_refsource_SECUNIA |
http://www.securityfocus.com/bid/44699 | vdb-entry x_refsource_BID |
http://www.zerodayinitiative.com/advisories/ZDI-10-235/ | x_refsource_MISC |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.zerodayinitiative.com/advisories/ZDI-10-233/ | x_refsource_MISC x_transferred |
http://www.zerodayinitiative.com/advisories/ZDI-10-234/ | x_refsource_MISC x_transferred |
http://securitytracker.com/id?1024693 | vdb-entry x_refsource_SECTRACK x_transferred |
http://tools.cisco.com/security/center/viewAlert.x?alertId=21726 | x_refsource_CONFIRM x_transferred |
http://www.zerodayinitiative.com/advisories/ZDI-10-232/ | x_refsource_MISC x_transferred |
http://www.vupen.com/english/advisories/2010/2914 | vdb-entry x_refsource_VUPEN x_transferred |
http://secunia.com/advisories/42146 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.securityfocus.com/bid/44699 | vdb-entry x_refsource_BID x_transferred |
http://www.zerodayinitiative.com/advisories/ZDI-10-235/ | x_refsource_MISC x_transferred |
Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent Contact Manager (ICM) before 7.0 allow remote attackers to execute arbitrary code via a long parameter in a (1) HandleUpgradeAll, (2) AgentUpgrade, (3) HandleQueryNodeInfoReq, or (4) HandleUpgradeTrace TCP packet, aka Bug IDs CSCti45698, CSCti45715, CSCti45726, and CSCti46164.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 10.0 | HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |