First published: Mon Apr 22 2002(Updated: )
Format string vulnerability in the administration function in Cisco Secure Access Control Server (ACS) for Windows, 2.6.x and earlier and 3.x through 3.01 (build 40), allows remote attackers to crash the CSADMIN module only (denial of service of administration function) or execute arbitrary code via format strings in the URL to port 2002.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control Server | =3.0.1 | |
Cisco Secure Access Control Server | =2.6.2 | |
Cisco Secure Access Control Server | =2.6.3 | |
Cisco Secure Access Control Server | =3.0 | |
Cisco Secure Access Control Server | =2.6.4 | |
Cisco Secure Access Control Server | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0159 is classified as a medium severity vulnerability due to the potential for denial of service and arbitrary code execution.
To fix CVE-2002-0159, update your Cisco Secure Access Control Server to a version that is not affected by this vulnerability.
CVE-2002-0159 affects Cisco Secure Access Control Server versions 2.6.x and 3.0.1, as well as certain earlier versions.
CVE-2002-0159 can enable remote attackers to perform a denial of service attack on the CSADMIN module or execute arbitrary code.
CVE-2002-0159 is considered a remote vulnerability, allowing attackers to exploit it without physical access to the machine.