Internet Security Systems RealSecure Desktop 3.6ecf

CPE Details

Internet Security Systems RealSecure Desktop 3.6ecf
3.6ecf
2007-08-23
19h16 +00:00
2008-03-25
18h15 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:iss:realsecure_desktop:3.6ecf:*:*:*:*:*:*:*

Informations

Vendor

iss

Product

realsecure_desktop

Version

3.6ecf

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2004-0193 2004-09-01 02h00 +00:00 Heap-based buffer overflow in the ISS Protocol Analysis Module (PAM), as used in certain versions of RealSecure Network 7.0 and Server Sensor 7.0, Proventia A, G, and M Series, RealSecure Desktop 7.0 and 3.6, RealSecure Guard 3.6, RealSecure Sentry 3.6, BlackICE PC Protection 3.6, and BlackICE Server Protection 3.6, allows remote attackers to execute arbitrary code via an SMB packet containing an authentication request with a long username.
7.5
CVE-2004-0362 2004-03-23 04h00 +00:00 Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm.
7.5