Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to crash the CSADMIN module only (denial of service of administration function) or execute arbitrary code via format strings in the URL to port 2002.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://www.osvdb.org/2062 | vdb entry |
http://www.iss.net/security_center/static/8742.php | vdb entry |
http://marc.info/?l=bugtraq&m=101787248913611&w=2 | mailing list |
http://www.cisco.com/warp/public/707/ACS-Win-Web.shtml | patch vendor advisory |
http://www.securityfocus.com/bid/4416 | vdb entry |