Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.100452
Categoría:Web Servers
Título:Zeus Web Server 'SSL2_CLIENT_HELLO' Remote Buffer Overflow Vulnerability
Resumen:Zeus Web Server is prone to a buffer-overflow vulnerability because; the application fails to perform adequate boundary checks on user-supplied data.
Descripción:Summary:
Zeus Web Server is prone to a buffer-overflow vulnerability because
the application fails to perform adequate boundary checks on user-supplied data.

Vulnerability Impact:
Attackers can exploit this issue to execute arbitrary code within the
context of the affected application. Failed exploit attempts will result in a denial-of-service condition.

Affected Software/OS:
Versions prior to Zeus Web Server 4.3r5 are vulnerable.

Solution:
No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features,
remove the product or replace the product by another one.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: BugTraq ID: 37829
Common Vulnerability Exposure (CVE) ID: CVE-2010-0359
http://www.securityfocus.com/bid/37829
http://intevydis.blogspot.com/2010/01/zeus-web-server-ssl2clienthello.html
http://intevydis.com/vd-list.shtml
http://www.osvdb.org/61699
http://securitytracker.com/id?1023465
http://secunia.com/advisories/38056
http://www.vupen.com/english/advisories/2010/0147
CopyrightCopyright (C) 2010 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.