CVE-2001-0636
CVSS7.5
发布时间 :2001-09-20 00:00:00
修订时间 :2008-09-05 16:24:35
NMCOS    

[原文]Buffer overflows in Raytheon SilentRunner allow remote attackers to (1) cause a denial of service in the collector (cle.exe) component of SilentRunner 2.0 via traffic containing long passwords, or (2) execute arbitrary commands via long HTTP queries in the Knowledge Browser component in SilentRunner 2.0 and 2.0.1. NOTE: It is highly likely that this candidate will be split into multiple candidates.


[CNNVD]Raytheon SilentRunner密码处理缓冲区溢出漏洞(CNNVD-200109-090)

        Raytheon SilentRunner存在缓冲区溢出漏洞。远程攻击者借助包含超长密码的通讯导致SilentRunner 2.0版本集电极(cle.exe)组件服务拒绝,或者借助SilentRunner 2.0 和2.0.1版本Knowledge Browser部件中超长HTTP查询执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:raytheon:silentrunner:2.0
cpe:/a:raytheon:silentrunner:2.0.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0636
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0636
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200109-090
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/alerts/advise91.php
(VENDOR_ADVISORY)  ISS  20010806 Multiple Buffer Overflow Vulnerabilities in Raytheon SilentRunner

- 漏洞信息

Raytheon SilentRunner密码处理缓冲区溢出漏洞
高危 缓冲区溢出
2001-09-20 00:00:00 2005-10-20 00:00:00
远程  
        Raytheon SilentRunner存在缓冲区溢出漏洞。远程攻击者借助包含超长密码的通讯导致SilentRunner 2.0版本集电极(cle.exe)组件服务拒绝,或者借助SilentRunner 2.0 和2.0.1版本Knowledge Browser部件中超长HTTP查询执行任意代码。

S (基础 un/者借助包含超长密码的通讯导致Silenv 平台与: bold ren /h2> nowraporder-top-style: none; border-right-style: none; border-bottom-style: none; border-left-st

<) Raytheon SilentRunner密码 nowraporlspan="2">     &nb
Raytheon SilentRunner密码timr/>漏洞类型:缓冲区溢出 dtaba &n 8-06 20p玜程 &n UnkickS (基 SilentRunner存在缓冲区溢出漏洞/td> pe" clas UnkickS label>攻击路径: Unkick b.n <>-CVSS分值:漏洞名称:Raytheon SilentRunner密码ffi/porlspan="2">    &nb atic>Re社d

"pm(':nowr/13908806 Multiple Buffe13908S ( 础atic>CVE IDs
title=") 础atic>Bugtraq IDs
ss="s X-Fw Vu IDs
low Vulnerabililow Vuilowr/6795源) CNNVD
679DS ( 础atic>Obelr ARaytory URLs
low Vulnerabilibsp;ISS  20010806 Multiple Buffer Overflow Vulnerabilities in Raytheon Silent 础at < b.n 平台与> <: boldtr> 2> >

low Vulnerabililow Vuilowr/679D
Raytheon SilentRunner密码author/porlspan="2">    &nUnkickn0 anIntipl6
<2> td col分类sp;Raythe &nbs Unkickn 8-06 12 9-07-11 07:56d> b.n <
Raytheon SilentRunner密码si/porlspan="2">    &n
20BugtraqIDsp;Raythe  i> 拒绝)组sp;RaytheYes
远程
<" style="wortr> h2 onc>CVSS分值:漏洞名称:Raytheon SilentRunner密码e.e1/ b.n
un/n tRunner 2.0版本集. un/n
>.0版本集.is a network owser comonitor in ui.aerif.ed by tRunner . un/ un/The owser coanalystitl HTTP queries in the Knowtitlelspl ' be split into mu'. be split into multionents a btor (cle.exe) t

- in be split into mu.

b.n <
CVSS分值:漏洞名称:Raytheon SilentRunner密码dioruth="67%">[严重(HIGH)]
> ur tip_te /span> CVS stserOTEe not awTEe rieanyexploits ow t" titnerue. If you fet-sweOTEe ntcerrw tw tTEe awTEe riemoEe reccandid = d = do, porder mail u otto b.n <
CVSS分值:漏洞名称:Raytheon SilentRunner密码exploit/"67%">[严重(HIGH)]
< b.n <
<>-CVSS分值:漏洞名称:Raytheon SilentRunner密码ffi/porlspan="2">    &n b
  • .0版本集.Produc= Homepagey/sh (tRunner ) un/
  • 平台与> <: bold 漏洞数: boldtr> re/Red hate border="0" width="100%"> S typeHan c bomu.els()
    漏洞35r">CVRaytheon SilentRungn="center" class = "cvss_high" bdshTEe9046458598dshTEe_t 8ds_ui.as_32 CN-hidls-bdshTEe9>p46458598ds_tdocu">S (p46458598ds_tqq">S (p46458598ds_ ">S (p46458598ds_t163">S (p46458598ds_fx">S (p46458598ds_baidu">S (p<8ds_moEe"> /a>4645859shTEeCoutablS (p bdshTEe_); data wi"0" ui.as&u 5376177" js.sinajs.cn/open/api/js/wb.js" type="text/ bdsh = _s.sjs.sinajs.cn/open/api/js/wb.js" type="text.cnt> 8ds_tiofig = {'bdT.js':'001-0636漏洞详情,CVE,漏洞库,CVE中文,OSVDB,BID,AVD" /> [ds-t duoshuoQc/co = { ds = (document.location.protocol == 'htt dshttps:' : 'http:') + dshgoogle.com/cse/ dsh=' + c'a href= ocus"||se:searchbox-only> y> ).appefdChild(ds } te; }
    pt" src="/static/script-eqummon.js"
    Menid="v>
    [gacomp"
    >CVE
    tName" -->CVECVECVECVEwier <19.org 活着就是为了改变世界/td难道还有其他原因吗?<19.org洞库(http:> tNp" -->CVEwier ame" -->CVECVEfbgpt type="textwidth="32%" rowspan="2""static="/stati>a> >stance escription" cont是 第一个以escrip主题iptionutton"" cont。了解更多span="/td请查阅[m('cvss')a o;background-color:#GIN[m(escrip主题iptionutton"" cont。了解更多span="/ooail?vulnId=CV与> <: b [. CCERT.

    京ICP备14GIN297号-2

    ) :f军); 盟er-bottom-li and Expoi_frii> t14 ial 14: bds黑盾科技论坛er-bottom-li and Expoi_frii> 第一urityfocus" dis ay: "href= "ndEd /14: " iv> /1) h.js%3Fca227db14814d01f2e44f433e48552'd.duos ).appefdChild(ds%3E%3Cest_103%3E")e name="ChineseN一enid="vPiwik0" width="80px" height="28px" cellpa入 ds_paq c _paq || [le -->_paq.push(['trtr>PageView'])e -->_paq.push(['en/ 解'])e -->r s = document.getElemeu=(("iv> "ndEd 14: "iv> ") + "="使用Google搜piwik/1imgerUrl', u+'piwiktd c'])e -->on_paq.push(['setS40eId', 1])e -->on>CVE

    tName" -->CVE hidd "tatic/im1.org
    >检索">OVA分n">< --> class="lo
    输入/sp键字或CVE 识"ww.cnnv23="pm_cvss请按照001-0613-0707、06130707习式输入查看001/td> 输入/sp键字检索。"/n">< - O" >
    OVA分值: