TippingPoint Zero Day Initiative

eIQnetworks Enterprise Security Analyzer Syslog TCP Server Buffer Overflow Vulnerability

ZDI-06-023: July 25th, 2006


Affected Vendors

Affected Products

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of eIQnetworks Enterprise Security Analyzer. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the Syslog daemon, syslogserver.exe, during the processing of long strings transmitted to the listening TCP port. The vulnerability is not exposed over UDP. The default configuration does not expose the open TCP port.

Vendor Response

eIQnetworks has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2006-05-10 - Vulnerability reported to vendor
    2006-07-25 - Coordinated public release of advisory


This vulnerability was discovered by:
    Titon, JxT, KF and the rest of Bastard Labs