First published: Sun Dec 31 2006(Updated: )
Stack-based buffer overflow in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allows remote attackers to execute arbitrary code via a crafted RADIUS Accounting-Request packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control Server | =3.2 | |
Cisco Secure Access Control Server | =3.2.2 | |
Cisco Secure Access Control Server | =3.3.2 | |
Cisco Secure Access Control Server | =4.0 | |
Cisco Secure Access Control Server | =3.3\(1\) | |
Cisco Secure Access Control Server | =4.0.1 | |
Cisco Secure Access Control Server | =3.0 | |
Cisco Secure Access Control Server | =3.2\(1.20\) | |
Cisco Secure Access Control Server | =3.1 | |
Cisco Secure Access Control Server | =3.3.1 | |
Cisco Secure Access Control Server | =3.3 | |
Cisco Secure Access Control Server | =3.2\(3\) | |
Cisco Secure Access Control Server | =3.2.1 | |
Cisco Secure Access Control Server | =3.2\(1\) | |
Cisco Secure Access Control Server | =3.2\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.