Cisco Security Agent for Windows Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID: 1019046|
SecurityTracker URL: http://securitytracker.com/id/1019046
(Links to External Site)
Date: Dec 5 2007
Execution of arbitrary code via network, Root access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 4.5.1, 5.0, 5.1, 5.2|
A vulnerability was reported in Cisco Security Agent for Windows. A remote user can execute arbitrary code on the target system.|
A remote user can send specially crafted data to TCP port 139 or 445 on the target system to trigger a buffer overflow in the 'Csatdi.sys' driver and execute arbitrary code on the target system. The code will run with kernel level privileges.
The following Cisco products include the agent software and are affected:
Cisco Unified Communications Manager (CallManager)
Cisco Conference Connection (CCC)
IP Interactive Voice Response (IP IVR)
IP Queue Manager
Intelligent Contact Management (ICM)
Cisco Voice Portal (CVP)
Cisco Unified Meeting Place
Cisco Personal Assistant (PA)
Cisco Unity Connection
Cisco Unity Bridge
Cisco Internet Service Node (ISN)
Cisco has assigned Cisco bug ID CSCsl00618 to this vulnerability.
NSFocus Security Team reported this vulnerability.
A remote user can execute arbitrary code on the target system.|
The vendor has issued the following hotfixes.|
The advisory also lists fixes for Cisco Security Agent for Cisco IP Communications Products and Cisco Security Agent for Cisco Security Manager.
The Cisco advisory is available at:
Vendor URL: www.cisco.com/warp/public/707/cisco-sa-20071205-csa.shtml (Links to External Site)
|Underlying OS: Windows (Any)|
Source Message Contents
[Original Message Not Available for Viewing]