First published: Thu Oct 25 2012(Updated: )
Stack-based buffer overflow in the Syslog service (nssyslogd.exe) in Enterasys Network Management Suite (NMS) before 4.1.0.80 allows remote attackers to execute arbitrary code via a long PRIO field in a message to UDP port 514.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Enterasys NetSight | <=4.1.0.79 | |
Enterasys NetSight | <=4.1.0.79 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5227 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2011-5227, upgrade Enterasys Network Management Suite to version 4.1.0.80 or later.
Organizations using Enterasys Netsight version 4.1.0.79 or below are affected by CVE-2011-5227.
CVE-2011-5227 is a stack-based buffer overflow vulnerability affecting the Syslog service.
Yes, CVE-2011-5227 can be exploited remotely via a specially crafted message sent to UDP port 514.