![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.100257 |
Category: | Web Servers |
Title: | NaviCOPA Web Server Remote Buffer Overflow and Source Code Information Disclosure Vulnerabilities |
Summary: | NaviCOPA Web Server is prone to a remote buffer-overflow vulnerability; and an information disclosure vulnerability because the application fails to properly bounds-check or; validate user-supplied input. |
Description: | Summary: NaviCOPA Web Server is prone to a remote buffer-overflow vulnerability and an information disclosure vulnerability because the application fails to properly bounds-check or validate user-supplied input. Vulnerability Impact: Successful exploits of the buffer-overflow issue may lead to the execution of arbitrary code in the context of the application or to denial-of-service conditions. Also, attackers can exploit the information-disclosure issue to retrieve arbitrary source code in the context of the webserver process. Information harvested may aid in further attacks. Affected Software/OS: NaviCOPA Web Server 3.01 is vulnerable. Other versions may also be affected. Solution: The vendor reports that NaviCOPA 3.01, with a release date of February 6, 2009, addresses this issue. Contact the vendor for details. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Copyright | Copyright (C) 2009 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |