CVE-2010-0138
Cisco CiscoWorks IPM GIOP getProcessName Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Buffer overflow in Cisco CiscoWorks Internetwork Performance Monitor (IPM) 2.6 and earlier on Windows, as distributed in CiscoWorks LAN Management Solution (LMS), allows remote attackers to execute arbitrary code via a malformed getProcessName CORBA General Inter-ORB Protocol (GIOP) request, related to a "third-party component," aka Bug ID CSCsv62350.
Desbordamiento de búfer en Cisco CiscoWorks Internetwork Performance Monitor (IPM) 2.6 y versiones anteriores en Windows, tal y como se distrubuye en CiscoWorks LAN Management Solution (LMS), permite a atacantes remotos ejecutar código de su elección mediante una petición getProcessName CORBA General Inter-ORB Protocol (GIOP) malformada, relacionado con un "componente de terceros", también conocido como Bug ID CSCsv62350.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cisco CiscoWorks Internetwork Performance Monitor. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the handling of CORBA GIOP requests. By making a specially crafted getProcessName GIOP request an attacker can corrupt memory. Successful exploitation can result in a full compromise with SYSTEM credentials.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-01-04 CVE Reserved
- 2010-01-21 CVE Published
- 2024-07-21 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1023484 | Vdb Entry | |
http://www.securityfocus.com/bid/37879 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-10-004 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55768 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/38230 | 2017-08-17 | |
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b1351d.shtml | 2017-08-17 | |
http://www.vupen.com/english/advisories/2010/0184 | 2017-08-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ciscoworks Internetwork Performance Monitor Search vendor "Cisco" for product "Ciscoworks Internetwork Performance Monitor" | <= 2.6 Search vendor "Cisco" for product "Ciscoworks Internetwork Performance Monitor" and version " <= 2.6" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Cisco Search vendor "Cisco" | Ciscoworks Internetwork Performance Monitor Search vendor "Cisco" for product "Ciscoworks Internetwork Performance Monitor" | 2.4 Search vendor "Cisco" for product "Ciscoworks Internetwork Performance Monitor" and version "2.4" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|
Cisco Search vendor "Cisco" | Ciscoworks Internetwork Performance Monitor Search vendor "Cisco" for product "Ciscoworks Internetwork Performance Monitor" | 2.5 Search vendor "Cisco" for product "Ciscoworks Internetwork Performance Monitor" and version "2.5" | - |
Affected
| in | Microsoft Search vendor "Microsoft" | Windows Search vendor "Microsoft" for product "Windows" | * | - |
Safe
|