Overview
Cisco Application and Content Networking Software (ACNS) contains a buffer overflow that may enable an attacker to execute arbitrary code on the affected device.
Description
Cisco ACNS Software "...combines demand-pull caching and pre-positioning for accelerated delivery of web applications, objects, files, and streaming media; and runs on Cisco Content Engines, Content Distribution Manager, and Content Router hardware platforms." From http://www.cisco.com/warp/public/707/cisco-sa-20031210-ACNS-auth.shtml: By entering an overly long password, it may be possible to execute arbitrary code on a vulnerable device. This vulnerability affects all devices and hardware modules that are running ACNS software releases prior to 4.2.11 and 5.0.5.
|
Impact
By supplying an overly long password, it is possible to trigger a buffer overflow in the authentication module. This may enable an attacker to execute arbitrary code on the affected device or cause denial of service. |
Solution
Upgrade |
no gui-server enable |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by the Cisco Systems Product Security Incident Response Team.
This document was written by Robert C Seacord.
Other Information
CVE IDs: | CVE-2003-0982 |
Severity Metric: | 12.96 |
Date Public: | 2003-12-10 |
Date First Published: | 2003-12-18 |
Date Last Updated: | 2003-12-23 15:05 UTC |
Document Revision: | 20 |