ID CVE-2006-6477
Summary FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode and configured to use only HTTP, allows local users to modify requests and responses between a client and an agent by hijacking an HTTP FRAgent daemon and conducting a man-in-the-middle (MITM) attack. Sucessful exploitation requires that the affected products are run in daemon mode and configured to use only HTTP. This vulnerability is addressed in the following product release: Mandiant, First Response, 1.1.1
References
Vulnerable Configurations
  • cpe:2.3:a:mandiant:first_response:*:*:*:*:*:*:*:*
    cpe:2.3:a:mandiant:first_response:*:*:*:*:*:*:*:*
CVSS
Base: 2.4 (as of 17-10-2018 - 21:48)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL HIGH SINGLE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:H/Au:S/C:N/I:P/A:P
refmap via4
bid 21548
bugtraq 20061218 SYMSA-2006-013: Multiple Vulnerabilities in Mandiant First Response
confirm http://www.mandiant.com/firstresponse.htm
misc http://www.symantec.com/enterprise/research/SYMSA-2006-013.txt
sectrack 1017394
secunia 23393
sreason 2052
vupen ADV-2006-5061
Last major update 17-10-2018 - 21:48
Published 20-12-2006 - 02:28
Last modified 17-10-2018 - 21:48
Back to Top