|
|
|
|
| |
Credit:
The information has been provided by Cisco Systems Product Security Incident Response Team.
The original article can be found at: http://www.cisco.com/warp/public/707/cisco-sa-20080313-ipm.shtml
|
| |
Vulnerable Systems:
* IPM version 2.6 for Solaris and Windows
Immune Systems:
* PM versions 2.5 and earlier
* IPM version 4.0
CiscoWorks IPM is a troubleshooting application that gauges network response time and availability. It is available as a component within the CiscoWorks LAN Management Solution (LMS) bundle. IPM version 2.6 for Solaris and Windows contains a process that causes a command shell to automatically be bound to a randomly selected TCP port. Remote, unauthenticated users are able to connect to the open port and execute arbitrary commands with casuser privileges on Solaris systems and with SYSTEM privileges on Windows systems. This vulnerability is documented in CVE-2008-1157 and Cisco Bug ID CSCsj06260 ( registered customers only) .
CVE Information:
CVE-2008-1157
Impact:
Successful exploitation of the vulnerability may result in the ability to execute arbitrary commands with the non-privileged casuser user account on Solaris systems and with full administrative SYSTEM privileges on Windows systems.
|
|
|
|
|