FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode and configured to use only HTTP, allows local users to modify requests and responses between a client and an agent by hijacking an HTTP FRAgent daemon and conducting a man-in-the-middle (MITM) attack.
References
Configurations
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23393 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/2052 - | |
References | () http://securitytracker.com/id?1017394 - Patch | |
References | () http://www.mandiant.com/firstresponse.htm - | |
References | () http://www.securityfocus.com/archive/1/454712/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21548 - Patch | |
References | () http://www.symantec.com/enterprise/research/SYMSA-2006-013.txt - Patch | |
References | () http://www.vupen.com/english/advisories/2006/5061 - |
Information
Published : 2006-12-20 02:28
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6477
Mitre link : CVE-2006-6477
CVE.ORG link : CVE-2006-6477
JSON object : View
Products Affected
mandiant
- first_response
CWE