Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> smb2www installed


Vulnerability Assessment Details

smb2www installed

Vulnerability Assessment Summary
smb2www Command Execution

Detailed Explanation for this Vulnerability Assessment

The remote host is running smb2www - a SMB to WWW gateway.

A possible hacker may use this CGI to use this host as a proxy -
he can connect to third parties SMB host without revealing
his IP address.

Solution : Enforce proper access controls to this CGI
Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Renaud Deraison

Cables, Connectors

Intel P4 1.7 Ghz 256/400/1.75v Socket 478 CPU SL5UG
$28.5
Intel P4 1.7 Ghz 256/400/1.75v Socket 478 CPU SL5UG pictureIntel P4 2.8GHz/512/533/1.525V Socket 478 CPU SL6PF
$28.5
Intel P4 2.8GHz/512/533/1.525V Socket 478 CPU SL6PF pictureIntel P4 1.5GHZ/256/400/1.75V Socket 478 CPU SL5SX
$23.75
Intel P4 1.5GHZ/256/400/1.75V Socket 478 CPU SL5SX pictureIntel P4 Processor 3.2Ghz/2048/800/1.3V Socket 775 CPU SL7Z8
$95.0
Intel P4 Processor 3.2Ghz/2048/800/1.3V Socket 775 CPU SL7Z8 picture


Discussions

No Discussions have been posted on this vulnerability.