The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml | vendor advisory |
http://www.kb.cert.org/vuls/id/472412 | third party advisory us government resource |
http://www.vupen.com/english/advisories/2007/0783 | vdb entry |
http://secunia.com/advisories/24344 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/22751 | vdb entry |
http://osvdb.org/33066 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188 | signature vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32750 | vdb entry |
http://www.securitytracker.com/id?1017710 | vdb entry |