Vulnerability Details : CVE-2010-3040
Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent Contact Manager (ICM) before 7.0 allow remote attackers to execute arbitrary code via a long parameter in a (1) HandleUpgradeAll, (2) AgentUpgrade, (3) HandleQueryNodeInfoReq, or (4) HandleUpgradeTrace TCP packet, aka Bug IDs CSCti45698, CSCti45715, CSCti45726, and CSCti46164.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2010-3040
Probability of exploitation activity in the next 30 days: 11.13%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-3040
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2010-3040
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-3040
-
http://www.securityfocus.com/bid/44699
Cisco Unified Intelligent Contact Management Enterprise 'agent.exe' Multiple Vulnerabilities
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=21726
Cisco Intelligent Contact Manager Setup Manager agent.exe Arbitrary Code Execution VulnerabilityVendor Advisory
-
http://www.zerodayinitiative.com/advisories/ZDI-10-234/
ZDI-10-234 | Zero Day Initiative
-
http://www.zerodayinitiative.com/advisories/ZDI-10-232/
ZDI-10-232 | Zero Day Initiative
-
http://www.zerodayinitiative.com/advisories/ZDI-10-233/
ZDI-10-233 | Zero Day Initiative
-
http://www.vupen.com/english/advisories/2010/2914
Webmail | OVH- OVHVendor Advisory
-
http://www.zerodayinitiative.com/advisories/ZDI-10-235/
ZDI-10-235 | Zero Day Initiative
-
http://securitytracker.com/id?1024693
Cisco Unified Intelligent Contact Management Buffer Overflows in 'Agent.exe' Let Remote Users Execute Arbitrary Code - SecurityTracker
Products affected by CVE-2010-3040
- cpe:2.3:a:cisco:intelligent_contact_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr11:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr13:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr7:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr9:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)_sr6:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)_sr8:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)a:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)_sr10:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)_sr2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)_sr3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)_sr4:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)a:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr10:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr12:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:5.0\(0\)_sr8:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)_sr1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)_sr5:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)_sr7:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:intelligent_contact_manager:6.0\(0\)_sr9:*:*:*:*:*:*:*