Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   Cisco Security Agent Vendors:   Cisco
Cisco Security Agent for Windows Buffer Overflow Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1019046
SecurityTracker URL:
CVE Reference:   CVE-2007-5580   (Links to External Site)
Date:  Dec 5 2007
Impact:   Execution of arbitrary code via network, Root access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.5.1, 5.0, 5.1, 5.2
Description:   A vulnerability was reported in Cisco Security Agent for Windows. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted data to TCP port 139 or 445 on the target system to trigger a buffer overflow in the 'Csatdi.sys' driver and execute arbitrary code on the target system. The code will run with kernel level privileges.

The following Cisco products include the agent software and are affected:

Cisco Unified Communications Manager (CallManager)
Cisco Conference Connection (CCC)
Emergency Responder
IPCC Express
IPCC Enterprise
IPCC Hosted
IP Interactive Voice Response (IP IVR)
IP Queue Manager
Intelligent Contact Management (ICM)
Cisco Voice Portal (CVP)
Cisco Unified Meeting Place
Cisco Personal Assistant (PA)
Cisco Unity
Cisco Unity Connection
Cisco Unity Bridge
Cisco Internet Service Node (ISN)

Cisco has assigned Cisco bug ID CSCsl00618 to this vulnerability.

NSFocus Security Team reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued the following hotfixes.

For 4.5.1:

For 5.0:

For 5.1:

For 5.2:

The advisory also lists fixes for Cisco Security Agent for Cisco IP Communications Products and Cisco Security Agent for Cisco Security Manager.

The Cisco advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC