First published: Sun Dec 31 2006(Updated: )
Stack-based buffer overflow in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allows remote attackers to execute arbitrary code via a crafted RADIUS Accounting-Request packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control Server | =3.2 | |
Cisco Secure Access Control Server | =3.2.2 | |
Cisco Secure Access Control Server | =3.3.2 | |
Cisco Secure Access Control Server | =4.0 | |
Cisco Secure Access Control Server | =3.3\(1\) | |
Cisco Secure Access Control Server | =4.0.1 | |
Cisco Secure Access Control Server | =3.0 | |
Cisco Secure Access Control Server | =3.2\(1.20\) | |
Cisco Secure Access Control Server | =3.1 | |
Cisco Secure Access Control Server | =3.3.1 | |
Cisco Secure Access Control Server | =3.3 | |
Cisco Secure Access Control Server | =3.2\(3\) | |
Cisco Secure Access Control Server | =3.2.1 | |
Cisco Secure Access Control Server | =3.2\(1\) | |
Cisco Secure Access Control Server | =3.2\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4098 is rated as a critical vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2006-4098, update to the latest version of Cisco Secure Access Control Server that addresses this vulnerability.
CVE-2006-4098 affects Cisco Secure Access Control Server versions prior to 4.1.
CVE-2006-4098 can be exploited through a crafted RADIUS Accounting-Request packet.
Exploitation of CVE-2006-4098 could result in arbitrary code execution on the affected system, compromising its integrity.