发布时间 :2005-05-02 00:00:00
修订时间 :2016-10-17 23:16:10

[原文]Multiple buffer overflows in RUMBA 7.3 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via crafted values in a profile file, as demonstrated using a long SysName field.

[CNNVD]NetManage RUMBA 7.4配置文件多个缓冲区溢出漏洞(CNNVD-200505-528)


- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20050401 Buffer Overflow within the RUMBA product
(UNKNOWN)  BID  12965
(UNKNOWN)  XF  rumba-profile-values-bo(19934)

- 漏洞信息

NetManage RUMBA 7.4配置文件多个缓冲区溢出漏洞
高危 缓冲区溢出
2005-05-02 00:00:00 2005-10-20 00:00:00

- 公告与补丁


- 漏洞信息

NetManage RUMBA Office Crafted Profile Overflow
Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-04-01 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

RUMBA Profile Handling Multiple Buffer Overflow Vulnerabilities
Boundary Condition Error 12965
Yes No
2005-04-01 12:00:00 2009-07-12 11:56:00
Discovery of this vulnerability is credited to Bahaa Naamneh <>.

- 受影响的程序版本

NetManage RUMBA 7.4
NetManage RUMBA 7.3

- 漏洞讨论

RUMBA is reported prone to multiple buffer overflow vulnerabilities. Theses issues are reported to manifest when RTO and WPA profiles are loaded by the software.

Ultimately it is conjectured that this issue may be exploited by a remote attacker to execute arbitrary attacker-supplied code in the context of the vulnerable software.

RUMBA version 7.3 is reported prone to this issue, previous versions are also reported to be affected.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: &lt;;.

The following proof of concepts are available:

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考