![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.100257 |
Kategorie: | Web Servers |
Titel: | NaviCOPA Web Server Remote Buffer Overflow and Source Code Information Disclosure Vulnerabilities |
Zusammenfassung: | NaviCOPA Web Server is prone to a remote buffer-overflow vulnerability; and an information disclosure vulnerability because the application fails to properly bounds-check or; validate user-supplied input. |
Beschreibung: | Summary: NaviCOPA Web Server is prone to a remote buffer-overflow vulnerability and an information disclosure vulnerability because the application fails to properly bounds-check or validate user-supplied input. Vulnerability Impact: Successful exploits of the buffer-overflow issue may lead to the execution of arbitrary code in the context of the application or to denial-of-service conditions. Also, attackers can exploit the information-disclosure issue to retrieve arbitrary source code in the context of the webserver process. Information harvested may aid in further attacks. Affected Software/OS: NaviCOPA Web Server 3.01 is vulnerable. Other versions may also be affected. Solution: The vendor reports that NaviCOPA 3.01, with a release date of February 6, 2009, addresses this issue. Contact the vendor for details. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Copyright | Copyright (C) 2009 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |