Computer Security
[EN] securityvulns.ru no-pyccku


Progress database server buffer overflow
Published:13.07.2007
Source:
SecurityVulns ID:7931
Type:remote
Threat Level:
7/10
Description:Buffer overflow in network service TCP/5220, TCP/5230. Progress is installed by diffgerent RSA products.
Affected:RSA : RSA ACE/Server 5.2
 RSA : RSA Authentication Manager 6.0
 RSA : RSA SecurID Appliance 2.0
 RSA : RSA Authentication Manager 6.1
CVE:CVE-2007-2417 (Heap-based buffer overflow in _mprosrv.exe in Progress Software Progress 9.1E and OpenEdge 10.1x, as used by the RSA Authentication Manager 6.0 and 6.1, SecurID Appliance 2.0, ACE/Server 5.2, and possibly other products, allows remote attackers to execute arbitrary code via crafted packets. NOTE: this issue might overlap CVE-2007-3491.)
Original documentdocument3COM, [Full-disclosure] TPTI-07-12: Multiple Vendor Progress Server Heap Overflow Vulnerability (13.07.2007)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod