SecurityFocus: 19163 - eIQnetworks Enterprise Security Analyzer License Manager Remote Buffer Overflow Vulnerability MetaSploit Name: eIQNetworks ESA License Manager LICMGR_ADDLICENSE OverflowĪctive APT Groups: □ Countermeasures info Recommended: Upgrade Nessus Name: eIQnetworks Enterprise Security Analyzer Monitoring.exe Multiple Command Overflow The vulnerability is also documented in the databases at SecurityTracker ( ID 1016580) and Tenable ( 22196). It is assigned to the family Windows and running in the context remote. The vulnerability scanner Nessus provides a plugin with the ID 22196 (eIQnetworks Enterprise Security Analyzer Monitoring.exe Multiple Command Overflow), which helps to determine the existence of the flaw in a target environment. It is possible to download the exploit at. USD $0-$5k ( estimation calculated on ).Ī public exploit has been developed in Perl. The current price for an exploit might be approx. Technical details and also a public exploit are known. No form of authentication is required for a successful exploitation. This vulnerability was named CVE-2006-3838 since. The weakness was presented by TippingPoint with Bastard Labs (Website). As an impact it is known to affect confidentiality, integrity, and availability. The software performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. The CWE definition for the vulnerability is CWE-119. The manipulation with an unknown input leads to a memory corruption vulnerability. This vulnerability affects an unknown part of the file syslogserver.exe. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability has been found in eIQnetworks Enterprise Security Analyzer ( the affected version is unknown) and classified as very critical. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |