The send_to_sourcefire function in manage_sql.c in OpenVAS Manager 3.x before 3.0.4 allows remote attackers to execute arbitrary commands via the (1) IP address or (2) port number field in an OMP request.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-11/0059.html | mailing list |
http://archives.neohapsis.com/archives/bugtraq/2012-11/0047.html | mailing list |
http://openwall.com/lists/oss-security/2012/11/13/9 | mailing list |
http://openwall.com/lists/oss-security/2012/11/14/5 | mailing list |
http://www.openvas.org/OVSA20121112.html | exploit patch vendor advisory |
http://secunia.com/advisories/49128 | third party advisory |
http://wald.intevation.org/scm/viewvc.php?view=rev&root=openvas&revision=14437 | |
http://www.securityfocus.com/bid/56497 | vdb entry |
http://openwall.com/lists/oss-security/2012/11/14/11 | mailing list |
http://archives.neohapsis.com/archives/bugtraq/2012-11/0055.html | mailing list |
http://openwall.com/lists/oss-security/2012/11/13/12 | mailing list |