Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.802245
Category:General
Title:eSignal Multiple Vulnerabilities
Summary:This host is installed with eSignal and is prone to multiple;vulnerabilities.
Description:Summary:
This host is installed with eSignal and is prone to multiple
vulnerabilities.

Vulnerability Insight:
- A boundary error in WinSig.exe when processing QUOTE files
can be exploited to cause a stack-based buffer overflow.

- A boundary error in WinSig.exe when processing the '' tag can be
exploited to cause a heap-based buffer overflow via a specially crafted
Time and Sales file.

- The application loads libraries in an insecure manner and can be exploited
to load arbitrary libraries by tricking a user into opening a QUOTE file
located on a remote WebDAV or SMB share.

Vulnerability Impact:
Successful exploitation allows execution of arbitrary code.

Affected Software/OS:
eSignal version 10.6.2425.1208 and prior.

Solution:
No known solution was made available for at least one year since the disclosure
of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
release, disable respective features, remove the product or replace the product by another one.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-3494
http://aluigi.altervista.org/adv/esignal_1-adv.txt
http://secunia.com/advisories/45966
Common Vulnerability Exposure (CVE) ID: CVE-2011-3503
http://osvdb.org/75458
XForce ISS Database: esignal-dll-code-execution(69786)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69786
CopyrightCopyright (C) 2011 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.