Advisory Details

July 25th, 2006

eIQnetworks Enterprise Security Analyzer Syslog TCP Server Buffer Overflow Vulnerability

ZDI-06-023
ZDI-CAN-053

CVE ID CVE-2006-3838
CVSS SCORE
AFFECTED VENDORS eIQnetworks
AFFECTED PRODUCTS Enterprise Security Analyzer
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of eIQnetworks Enterprise Security Analyzer. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the Syslog daemon, syslogserver.exe, during the processing of long strings transmitted to the listening TCP port. The vulnerability is not exposed over UDP. The default configuration does not expose the open TCP port.

ADDITIONAL DETAILS eIQnetworks has issued an update to correct this vulnerability. More details can be found at:
http://www.eiqnetworks.com/products/enterprisesecurity/EnterpriseSecurityAnalyzer/ESA_2.5.0_Release_Notes.pdf
DISCLOSURE TIMELINE
  • 2006-05-10 - Vulnerability reported to vendor
  • 2006-07-25 - Coordinated public release of advisory
CREDIT Titon, JxT, KF and the rest of Bastard Labs
BACK TO ADVISORIES