Overview
Cisco Application and Content Networking Software (ACNS) contains a buffer overflow that may enable an attacker to execute arbitrary code on the affected device.
Description
| Cisco ACNS Software "...combines demand-pull caching and pre-positioning for accelerated delivery of web applications, objects, files, and streaming media; and runs on Cisco Content Engines, Content Distribution Manager, and Content Router hardware platforms." From http://www.cisco.com/warp/public/707/cisco-sa-20031210-ACNS-auth.shtml: By entering an overly long password, it may be possible to execute arbitrary code on a vulnerable device. This vulnerability affects all devices and hardware modules that are running ACNS software releases prior to 4.2.11 and 5.0.5. 
 | 
Impact
| By supplying an overly long password, it is possible to trigger a buffer overflow in the authentication module. This may enable an attacker to execute arbitrary code on the affected device or cause denial of service. | 
Solution
| Upgrade | 
| 
 no gui-server enable | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was reported by the Cisco Systems Product Security Incident Response Team.
This document was written by Robert C Seacord.
Other Information
| CVE IDs: | CVE-2003-0982 | 
| Severity Metric: | 12.96 | 
| Date Public: | 2003-12-10 | 
| Date First Published: | 2003-12-18 | 
| Date Last Updated: | 2003-12-23 15:05 UTC | 
| Document Revision: | 20 |