eIQnetworks Enterprise Security Analyzer Syslog TCP Server Buffer Overflow VulnerabilityZDI-06-023: July 25th, 2006
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of eIQnetworks Enterprise Security Analyzer. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Syslog daemon, syslogserver.exe, during the processing of long strings transmitted to the listening TCP port. The vulnerability is not exposed over UDP. The default configuration does not expose the open TCP port.
Vendor ResponseeIQnetworks has issued an update to correct this vulnerability. More details can be found at:
2006-05-10 - Vulnerability reported to vendor
2006-07-25 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Titon, JxT, KF and the rest of Bastard Labs