First published: Wed Dec 01 2004(Updated: )
The buffer overflow trigger in Cisco Security Agent (CSA) before 4.0.3 build 728 waits five minutes for a user response before terminating the process, which could allow remote attackers to bypass the buffer overflow protection by sending additional buffer overflow attacks within the five minute timeout period.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Security Agent | =3 | |
Cisco Security Agent | =4.0 | |
Cisco Security Agent | =4.0.1 | |
Cisco Security Agent | =4.0.2 | |
Cisco Security Agent | =4.0.3 | |
Cisco Okena StormWatch | =3.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the buffer overflow issue in Cisco Security Agent is CVE-2004-1112.
CVE-2004-1112 is considered to be a critical vulnerability due to the potential for remote attackers to exploit it.
To fix CVE-2004-1112, update Cisco Security Agent to version 4.0.3 or later.
CVE-2004-1112 affects Cisco Security Agent versions 3.x and 4.0 through 4.0.2, as well as Cisco Okena StormWatch 3.x.
CVE-2004-1112 allows remote attackers to send additional buffer overflow attacks during the five-minute wait period before the process terminates.