Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> General >> Mediahouse Statistics Web Server Detect

Vulnerability Assessment Details

Mediahouse Statistics Web Server Detect

Vulnerability Assessment Summary
Mediahouse Statistics Web Server Detection

Detailed Explanation for this Vulnerability Assessment
We detected the remote web server as a
Mediahouse Statistics web server. This web server suffers from a security
vulnerability that enables attackers to gain sensitive information on the
current logged events on the public web server (the server being monitored
by MediaHouse).
This information includes: who is on (currently surfing users), the user's
actions, customer's IP addresses, referrer URLs, hidden directories, web
server usernames and passwords, and more.

Some versions of the product also suffer from a flaw that permits attackers
to overflow an internal buffer causing it to execute arbitrary code.

Solution: Block the web server's port number on your Firewall, and
upgrade to the latest version if necessary.

Network Security Threat Level: High

Networks Security ID: 1568

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 SecuriTeam

Cables, Connectors

High-Speed USB 3.0 2.5" inch SATA HDD/SSD Hard Drive Enclosure Case External Box
High-Speed USB 3.0 2.5 INTEL 300GB 710 Series 2.5" SATA SSD State Drive
 INTEL 300GB 710 Series 2.5Systor 2.5" to 3.5" SSD Hard Drive Caddy Adapter Apple Mac Pro SATA P1001A
Systor 2.5Seagate 1200.2 SSD ST3840FM0043 - solid state drive - 3840 GB - SAS 12Gb/s
Seagate 1200.2 SSD ST3840FM0043 - solid state drive - 3840 GB - SAS 12Gb/s picture


No Discussions have been posted on this vulnerability.