Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.105983
Kategorie:CISCO
Titel:Cisco ASA VNMC Command Input Validation Vulnerability
Zusammenfassung:The Virtual Network Management Center implementation of Cisco ASA is;prone to a command input validation vulnerability.
Beschreibung:Summary:
The Virtual Network Management Center implementation of Cisco ASA is
prone to a command input validation vulnerability.

Vulnerability Insight:
A vulnerability in the Virtual Network Management Center (VNMC) policy
code of Cisco ASA Software could allow an authenticated, local attacker to access the underlying Linux operating
system with the privileges of the root user.
The vulnerability is due to insufficient sanitization of user supplied input. An attacker could exploit this
vulnerability by logging in to an affected system as administrator, copying a malicious script onto the disk,
and executing the script.

Vulnerability Impact:
An authenticated, local attacker could exploit this vulnerability by
supplying malicious input to the affected scripts. If successful, the attacker could run arbitrary commands
on the underlying operating system with the privileges of the root user, resulting in a complete system compromise.

Affected Software/OS:
Version 8.7, 9.2 and 9.3

Solution:
Apply the appropriate updates from Cisco.

CVSS Score:
6.8

CVSS Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C

Querverweis: BugTraq ID: 70296
Common Vulnerability Exposure (CVE) ID: CVE-2014-3390
Cisco Security Advisory: 20141008 Multiple Vulnerabilities in Cisco ASA Software
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141008-asa
CopyrightThis script is Copyright (C) 2015 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.