Vulnerability Bulletins |
Ejecución de código en Cisco Prime LAN Management Solution |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Obtener acceso |
Dificulty | Avanzado |
Required attacker level | Acceso remoto sin cuenta a un servicio estandar |
System information |
|
Property | Value |
Affected manufacturer | Comercial Software |
Affected software |
Cisco Prime Lan Management Solution 4.2.2 Cisco Prime Lan Management Solution 4.2.1 Cisco Prime Lan Management Solution 4.2 Cisco Prime Lan Management Solution 4.1 |
Description |
|
Cisco Prime LAN Management Solution (LMS) v4.1 a v4.2.2 en Linux no valida correctamente las solicitudes de autenticación y autorización en sesiones TCP, lo que permite a atacantes remotos ejecutar código de su elección a través de una sesión hecha a mano. | |
Solution |
|
Un parche de seguridad esta disponible en http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-lms | |
Standar resources |
|
Property | Value |
CVE | CVE-2012-6392 |
BID | |
Other resources |
|
Cisco Prime LAN Management Solution Command Execution Vulnerability http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130109-lms |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2013-01-20 |