Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe); (13) GUIADDDEVICE, (14) ADDDEVICE, and (15) DELETEDEVICE commands to the Topology server (Topology.exe); the (15) LICMGR_ADDLICENSE command to the License Manager (EnterpriseSecurityAnalyzer.exe); the (16) TRACE and (17) QUERYMONITOR commands to the Monitoring agent (Monitoring.exe); and possibly other vectors related to the Syslog daemon (syslogserver.exe).
References
Link Providers
http://archive.cert.uni-stuttgart.de/bugtraq/2006/08/msg00152.html cve-icon cve-icon
http://secunia.com/advisories/21211 cve-icon cve-icon
http://secunia.com/advisories/21213 cve-icon cve-icon
http://secunia.com/advisories/21214 cve-icon cve-icon
http://secunia.com/advisories/21215 cve-icon cve-icon
http://secunia.com/advisories/21217 cve-icon cve-icon
http://secunia.com/advisories/21218 cve-icon cve-icon
http://securitytracker.com/id?1016580 cve-icon cve-icon
http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf cve-icon cve-icon
http://www.kb.cert.org/vuls/id/513068 cve-icon cve-icon
http://www.osvdb.org/27525 cve-icon cve-icon
http://www.osvdb.org/27526 cve-icon cve-icon
http://www.osvdb.org/27527 cve-icon cve-icon
http://www.osvdb.org/27528 cve-icon cve-icon
http://www.securityfocus.com/archive/1/441195/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/441197/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/441198/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/441200/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/19163 cve-icon cve-icon
http://www.securityfocus.com/bid/19164 cve-icon cve-icon
http://www.securityfocus.com/bid/19165 cve-icon cve-icon
http://www.securityfocus.com/bid/19167 cve-icon cve-icon
http://www.tippingpoint.com/security/advisories/TSRT-06-03.html cve-icon cve-icon
http://www.tippingpoint.com/security/advisories/TSRT-06-04.html cve-icon cve-icon
http://www.tippingpoint.com/security/advisories/TSRT-06-07.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/2985 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3006 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3007 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3008 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3009 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3010 cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-06-023.html cve-icon cve-icon
http://www.zerodayinitiative.com/advisories/ZDI-06-024.html cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/27950 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/27951 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/27952 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/27953 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/27954 cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2006-07-27T01:00:00

Updated: 2024-08-07T18:48:39.293Z

Reserved: 2006-07-25T00:00:00

Link: CVE-2006-3838

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-07-27T01:04:00.000

Modified: 2024-11-21T00:14:32.833

Link: CVE-2006-3838

cve-icon Redhat

No data.