|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gain root remotely >> Rendezvous HTTP Interface Buffer Overflow Vulnerability Vulnerability Assessment Details
|
Rendezvous HTTP Interface Buffer Overflow Vulnerability |
||
Checks version number in Rendezvous' HTTP banner Detailed Explanation for this Vulnerability Assessment Summary : The remote server is prone to a buffer overflow attack. Description : The remote host appears to be running Rendezvous, a commercial messaging software product used for building distributed applications According to its banner, several of the components in the version of Rendezvous installed on the remote host contain a buffer overflow vulnerability in the HTTP administrative interface that may permit arbitrary code execution subject to the rights of the user that invoked the daemon, or 'nobody' in the case the remote system is 'unix' and the invoking user was 'root'. See also : http://www.tibco.com/resources/mk/rendezvous_security_advisory.txt http://www.kb.cert.org/vuls/id/999884 Solution : Upgrade to Rendezvous 7.5.1 or later. Network Security Threat Level: High / CVSS Base Score : 7.0 (AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N) Networks Security ID: 18301 Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |