|
|||
Rule General Information |
---|
Release Date: | 2019-07-06 | |
Rule Name: | Alcatel OmniPCX Office FastJSData.cgi id2 Parameter Command Execution Vulnerability (CVE-2008-1331) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | cgi-data/FastJSData.cgi in OmniPCX Office with Internet Access services OXO210 before 210/091.001, OXO600 before 610/014.001, and other versions, allows remote attackers to execute arbitrary commands and "obtain OXO resources" via shell metacharacters in the id2 parameter. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:28758 ExploitDB:5662 SecurityTrackerID:1020082 http://secunia.com/advisories/29798 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://www.alcatel-lucent.com/wps/portal |