CVE-2014-3804
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
13/06/2014
Last modified:
12/04/2025
Description
The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) update_system_info_debian_package, (2) ossec_task, (3) set_ossim_setup admin_ip, (4) sync_rserver, or (5) set_ossim_setup framework_ip request, a different vulnerability than CVE-2014-3805.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:alienvault:open_source_security_information_management:*:*:*:*:*:*:*:* | 4.6.1 (including) | |
| cpe:2.3:a:alienvault:open_source_security_information_management:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.3.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.3.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:alienvault:open_source_security_information_management:4.4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://forums.alienvault.com/discussion/2690
- http://zerodayinitiative.com/advisories/ZDI-14-196/
- http://zerodayinitiative.com/advisories/ZDI-14-197/
- http://zerodayinitiative.com/advisories/ZDI-14-200/
- http://zerodayinitiative.com/advisories/ZDI-14-201/
- http://zerodayinitiative.com/advisories/ZDI-14-202/
- https://www.exploit-db.com/exploits/42708/
- http://forums.alienvault.com/discussion/2690
- http://zerodayinitiative.com/advisories/ZDI-14-196/
- http://zerodayinitiative.com/advisories/ZDI-14-197/
- http://zerodayinitiative.com/advisories/ZDI-14-200/
- http://zerodayinitiative.com/advisories/ZDI-14-201/
- http://zerodayinitiative.com/advisories/ZDI-14-202/
- https://www.exploit-db.com/exploits/42708/



