First published: Mon Nov 26 2012(Updated: )
The send_to_sourcefire function in manage_sql.c in OpenVAS Manager 3.x before 3.0.4 allows remote attackers to execute arbitrary commands via the (1) IP address or (2) port number field in an OMP request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenVAS Manager | =3.0-beta1 | |
OpenVAS Manager | =3.0-beta2 | |
OpenVAS Manager | =3.0-beta3 | |
OpenVAS Manager | =3.0-beta4 | |
OpenVAS Manager | =3.0-beta5 | |
OpenVAS Manager | =3.0-beta6 | |
OpenVAS Manager | =3.0-beta7 | |
OpenVAS Manager | =3.0-beta8 | |
OpenVAS Manager | =3.0-rc1 | |
OpenVAS Manager | =3.0.0 | |
OpenVAS Manager | =3.0.1 | |
OpenVAS Manager | =3.0.2 | |
OpenVAS Manager | =3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5520 is considered a high severity vulnerability as it allows remote attackers to execute arbitrary commands.
To fix CVE-2012-5520, update OpenVAS Manager to version 3.0.4 or later.
CVE-2012-5520 affects OpenVAS Manager versions 3.0-beta1 through 3.0.3.
Yes, CVE-2012-5520 can be exploited remotely via specific fields in an OMP request.
The impact of CVE-2012-5520 on system security is significant as it permits arbitrary command execution.