Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.900456
Kategorie:Buffer overflow
Titel:FUJITSU SystemWizard Lite Multiple Vulnerabilities
Zusammenfassung:FUJITSU SystemWizard Lite is prone to multiple vulnerabilities.
Beschreibung:Summary:
FUJITSU SystemWizard Lite is prone to multiple vulnerabilities.

Vulnerability Insight:
Improper boundary check of input data in DefaultSkin.ini in TFTP service,
Registry Setting Tool and PXEService.exe files.

Vulnerability Impact:
Successful exploitation will let the attacker execute arbitrary codes via
a large PXE protocol request in a UDP packet and also directory traversal
attack sequences in unspecified vectors.

Affected Software/OS:
FUJITSU SystemWizard Lite version 2.0A and prior on Windows.

Solution:
Apply the security patches from the linked references.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-0264
BugTraq ID: 33644
http://www.securityfocus.com/bid/33644
XForce ISS Database: systemcast-registrytool-bo(48315)
https://exchange.xforce.ibmcloud.com/vulnerabilities/48315
Common Vulnerability Exposure (CVE) ID: CVE-2009-0270
BugTraq ID: 33342
http://www.securityfocus.com/bid/33342
Bugtraq: 20090119 [Wintercore Research ] Fujitsu SystemcastWizard Lite PXEService Remote Buffer Overflow. (Google Search)
http://www.securityfocus.com/archive/1/500172/100/0/threaded
http://www.wintercore.com/advisories/advisory_W010109.html
http://osvdb.org/51486
http://secunia.com/advisories/33594
http://www.vupen.com/english/advisories/2009/0176
Common Vulnerability Exposure (CVE) ID: CVE-2009-0271
BugTraq ID: 33344
http://www.securityfocus.com/bid/33344
http://osvdb.org/51487
CopyrightCopyright (C) 2009 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.