First published: Thu Sep 23 2010(Updated: )
Stack-based buffer overflow in the HTTP proxy service in Alcatel-Lucent OmniVista 4760 server before R5.1.06.03.c_Patch3 allows remote attackers to execute arbitrary code or cause a denial of service (service crash) via a long request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Alcatel-Lucent OmniVista | <=5.1.06.03.c | |
Alcatel-Lucent OmniVista | =4.1.13.00 | |
Alcatel-Lucent OmniVista | =5.0 | |
Alcatel-Lucent OmniVista | =5.1 | |
Alcatel-Lucent OmniVista | =5.1.06.03.c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3281 has a high severity rating due to its potential for remote code execution and denial of service.
To mitigate CVE-2010-3281, upgrade the Alcatel-Lucent OmniVista 4760 server to version R5.1.06.03.c_Patch3 or later.
All versions of the Alcatel-Lucent OmniVista 4760 server prior to R5.1.06.03.c_Patch3 are affected by CVE-2010-3281.
CVE-2010-3281 can be exploited through specially crafted long requests sent to the HTTP proxy service, leading to arbitrary code execution.
There are no recommended workarounds for CVE-2010-3281; patching is the best defense.