Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.902045 |
Category: | General |
Title: | aMSN session hijack vulnerability (Windows) |
Summary: | This host is installed with aMSN and is prone to session hijack; vulnerability. |
Description: | Summary: This host is installed with aMSN and is prone to session hijack vulnerability. Vulnerability Insight: The flaw is due to the error in 'login_screen.tcl' which saves a password after logout which allows attackers to hijack a session. Vulnerability Impact: Successful exploitation will let attackers to hijack a session by visiting an unattended workstation. Affected Software/OS: aMSN vesrion prior to 0.97.1 Solution: Upgrade to the aMSN version 0.97.1. CVSS Score: 4.6 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-7255 |
Copyright | Copyright (C) 2010 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |