Enterprise Security Analyzer
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of eIQnetworks Enterprise Security Analyzer. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Syslog daemon, syslogserver.exe, during the processing of long strings transmitted to the listening TCP port. The vulnerability is not exposed over UDP. The default configuration does not expose the open TCP port.
eIQnetworks has issued an update to correct this vulnerability. More details can be found at:
|CREDIT||Titon, JxT, KF and the rest of Bastard Labs