CVE-2014-3805CVE-2014-3805

Affected configuration(s):

cpe:/a:alienvault:open_source_security_information_management:4.0
cpe:/a:alienvault:open_source_security_information_management:4.0.3
cpe:/a:alienvault:open_source_security_information_management:4.0.4
cpe:/a:alienvault:open_source_security_information_management:4.1
cpe:/a:alienvault:open_source_security_information_management:4.1.2
cpe:/a:alienvault:open_source_security_information_management:4.1.3
cpe:/a:alienvault:open_source_security_information_management:4.2
cpe:/a:alienvault:open_source_security_information_management:4.2.2
cpe:/a:alienvault:open_source_security_information_management:4.2.3
cpe:/a:alienvault:open_source_security_information_management:4.3
cpe:/a:alienvault:open_source_security_information_management:4.3.1
cpe:/a:alienvault:open_source_security_information_management:4.3.2
cpe:/a:alienvault:open_source_security_information_management:4.3.3
cpe:/a:alienvault:open_source_security_information_management:4.4
cpe:/a:alienvault:open_source_security_information_management:4.5
cpe:/a:alienvault:open_source_security_information_management:4.6
cpe:/a:alienvault:open_source_security_information_management:4.6.1

Date published: 2014-06-13T10:55:15.727-04:00

Date last modified: 2017-09-15T21:29:00.623-04:00

CVSS Score: 10.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://forums.alienvault.com/discussion/2690

Summary: The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) get_license, (2) get_log_line, or (3) update_system/upgrade_pro_web request, a different vulnerability than CVE-2014-3804.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.