| VID |
22010 |
| Severity |
40 |
| Port |
80, ¡¦ |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Enterprise Server 3.6 SP2 with the SSL Handshake Patch applied is vulnerable to a remotely exploitable buffer overflow. The hole exists in the server's handling of Accept headers submitted by a browsing client, and could allow remote attackers to cause a denial of service or to execute arbitrary commands on the system with the privileges of the server process. The remote web server seems to crash when it is issued a too long argument to the "Accept:" command :
Example :
GET / HTTP/1.0 Accept: <thousands of chars>/gif
* References: http://www.iss.net/security_center/static/3256.php http://www.securityfocus.com/bid/631 |
| Recommendation |
Contact Netscape Communications for a patch. |
| Related URL |
CVE-1999-0751 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|