A10 Networks Remote Buffer Overflow

medium Nessus Plugin ID 73498

Synopsis

The remote A10 appliance is affected by a buffer overflow vulnerability.

Description

According to the self reported version of the remote A10 appliance, it is affected by a remote buffer overflow vulnerability. By sending a specially crafted HTTP request, it may be possible to execute arbitrary code or trigger a denial service condition.

Solution

Upgrade to software version 2.7.0-P6 or later.

See Also

http://www.quantumleap.it/a10-networks-remote-buffer-overflow-softax/

Plugin Details

Severity: Medium

ID: 73498

File Name: a10_270_p6.nasl

Version: 1.6

Type: remote

Family: Misc.

Published: 4/14/2014

Updated: 11/26/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2014-3976

Vulnerability Information

CPE: cpe:/o:a10networks:advanced_core_operating_system

Required KB Items: A10/ACOS

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/28/2014

Vulnerability Publication Date: 5/30/2013

Reference Information

CVE: CVE-2014-3976

BID: 66588