CVE-2007-5580
Published Dec 15, 2007
Last updated 6 years ago
Overview
- Description
- Buffer overflow in a certain driver in Cisco Security Agent 4.5.1 before 4.5.1.672, 5.0 before 5.0.0.225, 5.1 before 5.1.0.106, and 5.2 before 5.2.0.238 on Windows allows remote attackers to execute arbitrary code via a crafted SMB packet in a TCP session on port (1) 139 or (2) 445.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:security_agent:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31271A5A-61AE-486E-830B-FBDA557D802A" }, { "criteria": "cpe:2.3:a:cisco:security_agent:3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F15A5A49-D0DF-4E65-A86E-7B71E7BF0273" }, { "criteria": "cpe:2.3:a:cisco:security_agent:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1089218C-A480-49CF-A499-5ABDAD017B92" }, { "criteria": "cpe:2.3:a:cisco:security_agent:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FA5B2E7-203D-4340-80C1-3CAF1A15A36C" }, { "criteria": "cpe:2.3:a:cisco:security_agent:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "612862DD-0FEE-4FBE-8750-EFC7BA22E792" }, { "criteria": "cpe:2.3:a:cisco:security_agent:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "845D746E-3269-4E43-836B-486331EC14EB" }, { "criteria": "cpe:2.3:a:cisco:security_agent:4.0.3.728:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90021BE3-85B4-46E5-BDC0-04A30B772063" }, { "criteria": "cpe:2.3:a:cisco:security_agent:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5562E755-E4A3-4656-859A-40757012BE89" }, { "criteria": "cpe:2.3:a:cisco:security_agent:4.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84A1657D-BBC9-4CF5-8F5A-486FAC8B9489" }, { "criteria": "cpe:2.3:a:cisco:security_agent:4.5.1.639:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14F08C40-7A58-4B0B-A3A1-6F23DB113F22" }, { "criteria": "cpe:2.3:a:cisco:security_agent:4.5.1.657:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92BCC996-7C45-479D-8952-00B079604CAC" }, { "criteria": "cpe:2.3:a:cisco:security_agent:4.5.1.659:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2AEBD5B-2EFD-465E-8108-24AB0CEB0892" }, { "criteria": "cpe:2.3:a:cisco:security_agent:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E171031D-51C1-41BB-96E4-DFFF0C36B74B" }, { "criteria": "cpe:2.3:a:cisco:security_agent:5.0.0.201:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A691B7B-A8B1-41D5-A6F2-7521146F02AD" }, { "criteria": "cpe:2.3:a:cisco:security_agent:5.0.193:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80FC93FD-9A77-49AD-86CB-414B041F52F0" }, { "criteria": "cpe:2.3:a:cisco:security_agent:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6DD0915-7671-42CD-8DF3-0B685389C528" }, { "criteria": "cpe:2.3:a:cisco:security_agent:5.1.79:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF1FE344-15E2-44B5-9346-253283CEBD3C" }, { "criteria": "cpe:2.3:a:cisco:security_agent:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "734B38F1-6FEC-4A94-B1C9-D076750A133F" } ], "operator": "OR" } ] } ]