![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.11069 |
Categoría: | Gain a shell remotely |
Título: | HTTP User-Agent Overflow DoS Vulnerability |
Resumen: | It was possible to kill the web server by; sending an invalid GET request with a too long User-Agent field. |
Descripción: | Summary: It was possible to kill the web server by sending an invalid GET request with a too long User-Agent field. Vulnerability Impact: An attacker may exploit this vulnerability to make the web server crash continually or even execute arbirtray code on your system. Affected Software/OS: Oracle9iAS Web Cache/2.0.0.1.0 is known to be affected. Other versions or products might be affected as well. Solution: Upgrade your software or protect it with a filtering reverse proxy. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2001-0836 Bugtraq: 20011018 def-2001-30 (Google Search) http://marc.info/?l=bugtraq&m=100342151132277&w=2 Bugtraq: 20011024 Oracle9iAS Web Cache Overflow Vulnerability (Google Search) http://marc.info/?l=bugtraq&m=100395487007578&w=2 http://www.cert.org/advisories/CA-2001-29.html CERT/CC vulnerability note: VU#649979 http://www.kb.cert.org/vuls/id/649979 http://www.osvdb.org/5534 XForce ISS Database: oracle-appserver-http-bo(7306) https://exchange.xforce.ibmcloud.com/vulnerabilities/7306 |
Copyright | Copyright (C) 2002 Michel Arboi |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |