|
Family: CGI abuses --> Category: destructive_attack
MediaHouse Statistic Server Buffer Overflow Vulnerability Scan
Vulnerability Scan Summary Overflow of /ss?
Detailed Explanation for this Vulnerability Test
It was possible to overflow a buffer in a CGI
on the remote server by making the request :
GET /ss?setsite=aaaa[....]aaaa
A possible hacker may use this flaw to execute arbitrary
code on this server.
Solution : There was no solution ready when this vulnerability was written
Please contact the vendor for updates that address this vulnerability.
Workaround : see http://w1.855.telia.com/~u85513179/index.html.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|