Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> WebServer 4D GET Buffer Overflow


Vulnerability Assessment Details

WebServer 4D GET Buffer Overflow

Vulnerability Assessment Summary
Crashes 4D WS

Detailed Explanation for this Vulnerability Assessment

It is possible to kill the web server by
sending an oversized string of '<' as an argument
to a GET request.

A cracker may exploit this vulnerability to make your web server
crash continually or even execute arbirtray code on your system.

Solution : upgrade your software or protect it with a filtering reverse proxy
Network Security Threat Level: High

Networks Security ID: 7479

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Tenable Network Security

Cables, Connectors

SanDisk ImageMate 5N1 Reader Memory Card Reader/Writer SDDR-99 V4 18' USB 2.0 A2
$8.49
SanDisk ImageMate 5N1 Reader Memory Card Reader/Writer SDDR-99 V4 18' USB 2.0 A2 pictureDEC / Digital MicroVax KA41D Module P/N 54-18858-01
$69.99
DEC / Digital MicroVax KA41D Module P/N 54-18858-01  pictureKomputerbay Memory 16GB (4x4GB) 667MHZ DDR2 ECC PC2-5300F Fully Buffered RAM
$49.98
Komputerbay Memory 16GB (4x4GB) 667MHZ DDR2 ECC PC2-5300F Fully Buffered RAM pictureTimetec 16GB (2*8GB) DDR3 1600 2Rx8 CL11 1.35V Laptop memory
$89.98
Timetec 16GB (2*8GB) DDR3 1600 2Rx8 CL11 1.35V Laptop memory picture


Discussions

No Discussions have been posted on this vulnerability.