CVE-2006-3838

N/A Unknown
Published: July 27, 2006 Modified: April 16, 2026
View on NVD

Description

Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) before 2.5.0, as used in products including (a) Sidewinder, (b) iPolicy Security Manager, (c) Astaro Report Manager, (d) Fortinet FortiReporter, (e) Top Layer Network Security Analyzer, and possibly other products, allow remote attackers to execute arbitrary code via long (1) DELTAINTERVAL, (2) LOGFOLDER, (3) DELETELOGS, (4) FWASERVER, (5) SYSLOGPUBLICIP, (6) GETFWAIMPORTLOG, (7) GETFWADELTA, (8) DELETERDEPDEVICE, (9) COMPRESSRAWLOGFILE, (10) GETSYSLOGFIREWALLS, (11) ADDPOLICY, and (12) EDITPOLICY commands to the Syslog daemon (syslogserver.exe); (13) GUIADDDEVICE, (14) ADDDEVICE, and (15) DELETEDEVICE commands to the Topology server (Topology.exe); the (15) LICMGR_ADDLICENSE command to the License Manager (EnterpriseSecurityAnalyzer.exe); the (16) TRACE and (17) QUERYMONITOR commands to the Monitoring agent (Monitoring.exe); and possibly other vectors related to the Syslog daemon (syslogserver.exe).

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/21211
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21213
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21214
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21215
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21217
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21218
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/513068
Source: cve@mitre.org
US Government Resource
http://www.osvdb.org/27525
Source: cve@mitre.org
http://www.osvdb.org/27526
Source: cve@mitre.org
http://www.osvdb.org/27527
Source: cve@mitre.org
http://www.osvdb.org/27528
Source: cve@mitre.org
http://www.vupen.com/english/advisories/2006/2985
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3006
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3007
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3008
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3009
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3010
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/21211
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21213
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21214
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21215
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21217
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21218
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1016580
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/513068
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.osvdb.org/27525
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27526
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27527
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/27528
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/441195/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/441197/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/441198/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/441200/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19163
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19164
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19165
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19167
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.tippingpoint.com/security/advisories/TSRT-06-03.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.tippingpoint.com/security/advisories/TSRT-06-04.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.tippingpoint.com/security/advisories/TSRT-06-07.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2985
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3006
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3007
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3008
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3009
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/3010
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-023.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.zerodayinitiative.com/advisories/ZDI-06-024.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27950
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27951
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27952
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27953
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27954
Source: af854a3a-2127-422b-91ae-364da2661108

76 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
71.5%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

eiqnetworks