CVE-2010-3040
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
09/11/2010
Last modified:
11/04/2025
Description
Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent Contact Manager (ICM) before 7.0 allow remote attackers to execute arbitrary code via a long parameter in a (1) HandleUpgradeAll, (2) AgentUpgrade, (3) HandleQueryNodeInfoReq, or (4) HandleUpgradeTrace TCP packet, aka Bug IDs CSCti45698, CSCti45715, CSCti45726, and CSCti46164.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:intelligent_contact_manager:*:*:*:*:*:*:*:* | 6.0\(0\)a\(1\) (including) | |
cpe:2.3:a:cisco:intelligent_contact_manager:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\):*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr2:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr3:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr4:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr5:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr7:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr8:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr9:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr10:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr11:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr12:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr13:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)a:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/42146
- http://securitytracker.com/id?1024693=
- http://tools.cisco.com/security/center/viewAlert.x?alertId=21726
- http://www.securityfocus.com/bid/44699
- http://www.vupen.com/english/advisories/2010/2914
- http://www.zerodayinitiative.com/advisories/ZDI-10-232/
- http://www.zerodayinitiative.com/advisories/ZDI-10-233/
- http://www.zerodayinitiative.com/advisories/ZDI-10-234/
- http://www.zerodayinitiative.com/advisories/ZDI-10-235/
- http://secunia.com/advisories/42146
- http://securitytracker.com/id?1024693=
- http://tools.cisco.com/security/center/viewAlert.x?alertId=21726
- http://www.securityfocus.com/bid/44699
- http://www.vupen.com/english/advisories/2010/2914
- http://www.zerodayinitiative.com/advisories/ZDI-10-232/
- http://www.zerodayinitiative.com/advisories/ZDI-10-233/
- http://www.zerodayinitiative.com/advisories/ZDI-10-234/
- http://www.zerodayinitiative.com/advisories/ZDI-10-235/