CVE-2014-3805
Published Jun 13, 2014
Last updated 7 years ago
Overview
- Description
- The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) get_license, (2) get_log_line, or (3) update_system/upgrade_pro_web request, a different vulnerability than CVE-2014-3804.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB7623E6-C31A-4B94-84A7-44B4E15E4EC9", "versionEndIncluding": "4.6.1" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F699448-40D9-46AD-978E-19CFC27B5D3E" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A841097-4529-44BF-802F-A6E7844110DE" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02991762-92A2-4E4A-AE1E-465470463BAC" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A3CBE8E-080B-4F90-A2AE-8BAD6E64F8ED" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EEF05B6-7664-455A-98FA-A7E750867914" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE3AED6C-9982-4A47-957E-7E3AFACF9183" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52F3C564-9BDF-4AB1-A289-6E89C7DDFA14" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A1E42B1-70C8-4BFD-8727-D91BFC42BFE4" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F401C06-FEF5-4EDB-9F60-A1D7D15C1930" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A075A304-E945-466A-BD6F-687DB4E0CAB6" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2EFBEEE-B52E-4D69-8A01-DE55080838AB" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC9C8686-878D-49DD-B1E9-842265B34306" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "826BA62F-D64D-4740-B39F-B5AD8B14C48C" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DDAA1EB-D69E-4DDE-8931-92667C297AB7" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46D7C427-DF18-48CA-B337-8AFD35FBF68A" }, { "criteria": "cpe:2.3:a:alienvault:open_source_security_information_management:4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57C05724-5D21-4D4D-B8A5-8B731250B5E3" } ], "operator": "OR" } ] } ]