The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/33066 - | |
References | () http://secunia.com/advisories/24344 - Vendor Advisory | |
References | () http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml - Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/472412 - US Government Resource | |
References | () http://www.securityfocus.com/bid/22751 - | |
References | () http://www.securitytracker.com/id?1017710 - | |
References | () http://www.vupen.com/english/advisories/2007/0783 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32750 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5188 - |
Information
Published : 2007-03-03 20:19
Updated : 2024-11-21 00:27
NVD link : CVE-2007-1257
Mitre link : CVE-2007-1257
CVE.ORG link : CVE-2007-1257
JSON object : View
Products Affected
cisco
- catalyst_7600_ws-x6380-nam
- catalyst_6000_ws-svc-nam-2
- catalyst_6500_ws-svc-nam-2
- catalyst_6000_ws-x6380-nam
- catalyst_6000_ws-svc-nam-1
- catalyst_6500_ws-svc-nam-1
- network_analysis_module
- catalyst_7600_ws-svc-nam-2
- catalyst_7600_ws-svc-nam-1
- catalyst_6500_ws-x6380-nam
CWE
CWE-20
Improper Input Validation