First published: Fri Mar 14 2008(Updated: )
Multiple buffer overflows in securecgi-bin/CSuserCGI.exe in User-Changeable Password (UCP) before 4.2 in Cisco Secure Access Control Server (ACS) for Windows and ACS Solution Engine allow remote attackers to execute arbitrary code via a long argument located immediately after the Logout argument, and possibly unspecified other vectors.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure ACS Solution Engine | ||
Cisco User Changeable Password | =4.1 | |
Cisco ACS for Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0532 has a high severity due to remote code execution risks from multiple buffer overflows.
To mitigate CVE-2008-0532, ensure that you upgrade to the latest version of Cisco ACS for Windows and ACS Solution Engine.
CVE-2008-0532 affects Cisco ACS for Windows versions before 4.2 and Cisco Secure ACS Solution Engine.
Yes, CVE-2008-0532 can be exploited remotely by attackers sending specially crafted arguments.
CVE-2008-0532 is classified as a buffer overflow vulnerability, allowing for arbitrary code execution.