{"vuid":"VU#319913","idnumber":"319913","name":"Aruba Mobility Controller Management Interface contains a buffer overflow","keywords":["Aruba Mobility Controller Management Interface","buffer overflow","malformed inputs"],"overview":"The Aruba Mobility Controller Management Interface contains a buffer overflow. This vulnerability may allow a remote attacker to execute arbitrary code on a vulnerable system.","clean_desc":"The Aruba Mobility Controllers are used to process and control network traffic in a wireless network. The Aruba Mobility Controller Management Interface is a utility used to configure and manage the Aruba Mobility Controllers. The management interface can be accessed via a command line or a web-based interface. The Aruba Mobility Controller Management Interface fails to properly handle malformed input allowing a buffer overflow to occur. If the Aruba Mobility Controller Management Interface is configured for remote management, this vulnerability can be triggered remotely. According to Aruba Networks this vulnerability affects Aruba Networks Mobility Controllers (200, 800, 2400, and 6000) running software versions 2.0 and later and Alcatel-Lucent OmniAccess Wireless 43xx and 6000 running software versions 2.0 and later.","impact":"A remote attacker may be able to execute arbitrary code on the affected Mobility Controller.","resolution":"Apply a patch from Aruba\nAruba has released a patch to address this vulnerability. For more information refer to the Systems Affected section of this document.","workarounds":"Restrict access You may wish to block access to the vulnerable software from outside your network perimeter, specifically by blocking access to Aruba Mobility Controller Management Interface web site as well as the device itself. This will limit your exposure to attacks.","sysaffected":"","thanks":"This vulnerability was reported by Aruba Networks.","author":"This document was written by Jeff Gennari.","public":["http://secunia.com/advisories/24144/","http://lists.grok.org.uk/pipermail/full-disclosure/2007-February/052382.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-02-09T12:55:45Z","publicdate":"2007-02-12T00:00:00Z","datefirstpublished":"2007-02-13T19:55:32Z","dateupdated":"2007-02-13T19:59:38Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"11","cam_impact":"18","cam_easeofexploitation":"18","cam_attackeraccessrequired":"12","cam_scorecurrent":"6.4152","cam_scorecurrentwidelyknown":"21.6513","cam_scorecurrentwidelyknownexploited":"37.6893","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":6.4152,"vulnote":null}