![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10748 |
Category: | Web Servers |
Title: | Mediahouse Statistics Web Server Multiple Vulnerabilities (2001) |
Summary: | Mediahouse Statistics web server is prone to multiple; vulnerabilities. |
Description: | Summary: Mediahouse Statistics web server is prone to multiple vulnerabilities. Vulnerability Insight: Mediahouse Statistics web server suffers from a security vulnerability that enables attackers to gain sensitive information on the current logged events on the public web server (the server being monitored by MediaHouse). This information includes: who is on (currently surfing users), the user's actions, customer's IP addresses, referrer URLs, hidden directories, web server usernames and passwords, and more. Some versions of the product also suffer from a flaw that allows attackers to overflow an internal buffer causing it to execute arbitrary code. Solution: Block the web server's port number on your Firewall, and update to the latest version if necessary. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2000-0776 BugTraq ID: 1568 http://www.securityfocus.com/bid/1568 Bugtraq: 20000810 [DeepZone Advisory] Statistics Server 5.02x stack overflow (Win2k remote exploit) (Google Search) http://archives.neohapsis.com/archives/bugtraq/2000-08/0118.html XForce ISS Database: mediahouse-stats-livestats-bo(5113) https://exchange.xforce.ibmcloud.com/vulnerabilities/5113 |
Copyright | Copyright (C) 2001 SecuriTeam & Copyright (C) 2001 Noam Rathaus |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |