2 results (0.010 seconds)

CVSS: 7.5EPSS: 22%CPEs: 6EXPL: 0

Heap-based buffer overflow in the management interfaces in (1) Aruba Mobility Controllers 200, 800, 2400, and 6000 and (2) Alcatel-Lucent OmniAccess Wireless 43xx and 6000 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via long credential strings. Un desbordamiento de búfer en la región heap de la memoria en las interfaces de administración de (1) Aruba Mobility Controllers 200, 800, 2400 y 6000 y (2) Alcatel-Lucent OmniAccess Wireless 43xx y 6000 permite a los atacantes remotos causar una denegación de servicio (bloqueo del proceso) y posiblemente ejecutar código arbitrario por medio de largas cadenas de credenciales. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052380.html http://osvdb.org/33184 http://secunia.com/advisories/24144 http://securityreason.com/securityalert/2244 http://www.kb.cert.org/vuls/id/319913 http://www.securityfocus.com/archive/1/459928/100/0/threaded http://www.securityfocus.com/bid/22538 https://exchange.xforce.ibmcloud.com/vulnerabilities/32459 •

CVSS: 7.5EPSS: 3%CPEs: 6EXPL: 0

The (1) Aruba Mobility Controllers 200, 600, 2400, and 6000 and (2) Alcatel-Lucent OmniAccess Wireless 43xx and 6000 do not properly implement authentication and privilege assignment for the guest account, which allows remote attackers to access administrative interfaces or the WLAN. Los (1) controladores Aruba Mobility versiones 200, 600, 2400 y 6000 y (2) Alcatel-Lucent OmniAccess Wireless versiones 43xx y 6000 implementan de manera inapropiada la autenticación y la asignación de privilegios para la cuenta del invitado, lo que permite a los atacantes remotos acceder a interfaces administrativas o a la WLAN. Multiple vulnerabilities were identified in Aruba AP, IAP and AMP devices. The vulnerabilities were discovered during a black box security assessment and therefore the vulnerability list should not be considered exhaustive. Several of the high severity vulnerabilities listed in this report are related to the Aruba proprietary PAPI protocol and allow remote compromise of affected devices. • http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052382.html http://osvdb.org/33185 http://secunia.com/advisories/24144 http://securityreason.com/securityalert/2243 http://www.kb.cert.org/vuls/id/613833 http://www.securityfocus.com/archive/1/459927/100/0/threaded http://www.securityfocus.com/bid/22538 https://exchange.xforce.ibmcloud.com/vulnerabilities/32461 • CWE-264: Permissions, Privileges, and Access Controls •