ID CVE-2011-2738
Summary Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used in Unified Operations Manager before 8.6 and CiscoWorks LAN Management Solution 3.x and 4.x before 4.1; and multiple EMC Ionix products including Application Connectivity Monitor (Ionix ACM) 2.3 and earlier, Adapter for Alcatel-Lucent 5620 SAM EMS (Ionix ASAM) 3.2.0.2 and earlier, IP Management Suite (Ionix IP) 8.1.1.1 and earlier, and other Ionix products; allow remote attackers to execute arbitrary code via crafted packets to TCP port 9002, aka Bug IDs CSCtn42961 and CSCtn64922, related to a buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:cisco:unified_service_monitor:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_service_monitor:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_service_monitor:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_service_monitor:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_service_monitor:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_service_monitor:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_service_monitor:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_service_monitor:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_service_monitor:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_service_monitor:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_service_monitor:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_service_monitor:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_service_monitor:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_service_monitor:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_service_monitor:-:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_service_monitor:-:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:december_2007:*:*:*:*:*:*
    cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.0:december_2007:*:*:*:*:*:*
  • cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:ciscoworks_lan_management_solution:3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:ciscoworks_lan_management_solution:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:ciscoworks_lan_management_solution:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:ciscoworks_lan_management_solution:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:ciscoworks_lan_management_solution:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:unified_operations_manager:-:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:unified_operations_manager:-:*:*:*:*:*:*:*
  • cpe:2.3:a:emc:ionix_acm:*:*:*:*:*:*:*:*
    cpe:2.3:a:emc:ionix_acm:*:*:*:*:*:*:*:*
  • cpe:2.3:a:emc:ionix_asam:*:*:*:*:*:*:*:*
    cpe:2.3:a:emc:ionix_asam:*:*:*:*:*:*:*:*
  • cpe:2.3:a:emc:ionix_ip:*:*:*:*:*:*:*:*
    cpe:2.3:a:emc:ionix_ip:*:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 09-10-2018 - 19:32)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid
  • 49627
  • 49644
bugtraq 20110914 ESA-2011-029: Buffer overflow vulnerability in multiple EMC Ionix products
cisco
  • 20110914 Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilities
  • 20110914 CiscoWorks LAN Management Solution Remote Code Execution Vulnerabilities
osvdb 75442
sectrack
  • 1026046
  • 1026047
  • 1026048
  • 1026059
secunia
  • 45979
  • 46016
  • 46052
  • 46053
xf cisco-unspecified-code-execution(69828)
Last major update 09-10-2018 - 19:32
Published 19-09-2011 - 12:02
Last modified 09-10-2018 - 19:32
Back to Top