2 results (0.001 seconds)

CVSS: 10.0EPSS: 14%CPEs: 10EXPL: 0

Stack-based buffer overflow in the Agranet-Emweb embedded management web server in Alcatel OmniSwitch OS7000, OS6600, OS6800, OS6850, and OS9000 Series devices with AoS 5.1 before 5.1.6.463.R02, 5.4 before 5.4.1.429.R01, 6.1.3 before 6.1.3.965.R01, 6.1.5 before 6.1.5.595.R01, and 6.3 before 6.3.1.966.R01 allows remote attackers to execute arbitrary code via a long Session cookie. Desbordamiento de búfer basado en pila en el servidor web de gestión embebido Agranet-Emweb de Alcatel OmniSwitch dispositivos OS7000, OS6600, OS6800, OS6850, y OS9000 Series con AoS 5.1 versiones anteriores a v5.1.6.463.R02, 5.4 versiones anteriores a v5.4.1.429.R01, 6.1.3 versiones anteriores a v6.1.3.965.R01, 6.1.5 versiones anteriores a v6.1.5.595.R01, y 6.3 versiones anteriores a v6.3.1.966.R01 permite a atacantes remotos ejecutar código de su elección a través de una cookie Session. • http://secunia.com/advisories/31435 http://securityreason.com/securityalert/4347 http://www.layereddefense.com/alcatel12aug.html http://www.securityfocus.com/archive/1/495343/100/0/threaded http://www.securityfocus.com/bid/30652 http://www.securitytracker.com/id?1020657 http://www.vupen.com/english/advisories/2008/2346 http://www1.alcatel-lucent.com/psirt/statements/2008002/OmniSwitch.htm https://exchange.xforce.ibmcloud.com/vulnerabilities/44400 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Alcatel OmniSwitch 7700/7800 switches running AOS 5.1.1 contains a back door telnet server that was intended for development but not removed before distribution, which allows remote attackers to gain administrative privileges. Los conmutadores Alcatel OmniSwitch 7700/7800 en los que corre AOS 5.1.1 contienen una puerta trasera al servidor de telnet, que fue creada para desarrollo, pero que no se eliminó antes de su distribución. Esto permite a atacantes remotos la obtención de privilegios de administración. • http://www.cert.org/advisories/CA-2002-32.html http://www.kb.cert.org/vuls/id/181721 http://www.securityfocus.com/bid/6220 https://exchange.xforce.ibmcloud.com/vulnerabilities/10664 •