Short Name |
HTTP:CISCO:MARS-JMX |
---|---|
Severity |
Major |
Recommended |
No |
Category |
HTTP |
Keywords |
Cisco MARS JMX |
Release Date |
2007/01/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against Cisco MARS Jmx engine. A successful attack can lead to arbitrary code execution.
Cisco Security Monitoring, Analysis and Response System (CS-MARS) is prone to multiple vulnerabilities, including privilege-escalation, arbitrary command-execution, and information-disclosure issues. An attacker could exploit these issues to retrieve potentially sensitive information and possibly execute arbitrary commands with superuser privileges. This may facilitate a remote compromise of affected computers. Cisco has released version 4.2.1 to address these issues; prior versions are reported vulnerable. This BID has been separated into the following individual records and is therefore being retired: BID 19073 (Cisco Security Monitoring Analysis and Response System Information Disclosure Vulnerabilities) BID 19075 (Cisco Security Monitoring Analysis and Response System Arbitrary Command Execution Vulnerability) BID 19077 (Cisco Security Monitoring Analysis and Response System Multiple Privilege Escalation Vulnerabilities)