Vulnerability Name:
CVE-1999-0744 (CCN-2384)
Assigned:
1999-08-02
Published:
1999-08-02
Updated:
2008-09-05
Summary:
Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request.
CVSS v3 Severity:
10.0 Critical
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
7.5 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
)
5.5 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
10.0 High
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
)
7.4 High
(CCN Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Gain Access
References:
Source: CCN
Type: BugTraq Mailing List, Fri Dec 31 1999 - 05:25:48 CST
Netscape FastTrack httpd remote exploit
Source: CCN
Type: BugTraq Mailing List, Tue Feb 29 2000 - 11:48:10 CST
[SAFER 000229.EXP.1.3] Remote buffer overflow in Netscape Enterprise Server 3.6 SP2
Source: MITRE
Type: CNA
CVE-1999-0744
Source: CCN
Type: CIAC Information Bulletin J-062
Netscape Enterprise and FastTrack Web Servers Buffer Overflow
Source: CCN
Type: iPlanet Web site
Downloads
Source: CCN
Type: Internet Security Systems Security Alert #37
Buffer Overflow in Netscape Enterprise and FastTrack Web Servers
Source: CCN
Type: OSVDB ID: 11446
Netscape Enterprise / FastTrack Server HTTP GET Remote Overflow
Source: CCN
Type: S.A.F.E.R. Security Bulletin SAFER 000229.EXP.1.3
Buffer Overflow in Netscape Enterprise Server
Source: CCN
Type: BID-1024
Netscape Enterprise Server GET Request Vulnerability
Source: CCN
Type: BID-6029
Mod_SSL Wildcard DNS Cross Site Scripting Vulnerability
Source: BID
Type: UNKNOWN
603
Source: CCN
Type: BID-908
Netscape FastTrack Server GET Buffer Overflow Vulnerability
Source: XF
Type: UNKNOWN
netscape-get-bo(2384)
Vulnerable Configuration:
Configuration 1
:
cpe:/a:netscape:enterprise_server:*:*:*:*:*:*:*:*
OR
cpe:/a:netscape:fasttrack_server:*:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:netscape:fasttrack_server:*:*:*:*:*:*:*:*
OR
cpe:/a:netscape:enterprise_server:*:*:*:*:*:*:*:*
AND
cpe:/o:ibm:aix:*:*:*:*:*:*:*:*
OR
cpe:/o:windriver:bsdos:*:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:*:*:*:*:*:*:*:*
OR
cpe:/o:sgi:irix:*:*:*:*:*:*:*:*
OR
cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*
OR
cpe:/o:sun:solaris:*:*:*:*:*:*:*:*
OR
cpe:/o:ibm:os2:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_95:*:*:*:*:*:*:*:*
OR
cpe:/a:data_general:dg_ux:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_98:*:*:*:*:*:*:*:*
OR
cpe:/a:novell:netware:*:*:*:*:*:*:*:*
OR
cpe:/o:sco:unix:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_98se:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
OR
cpe:/o:cisco:ios:*:*:*:*:*:*:*:*
OR
cpe:/o:sco:unixware:7.1:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_me:*:*:*:*:*:*:*:*
OR
cpe:/o:compaq:tru64:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows:xp:*:*:*:*:*:*:*
OR
cpe:/o:apple:mac_os:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows:2003_server:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
netscape
enterprise server *
netscape
fasttrack server *
netscape
fasttrack server *
netscape
enterprise server *
ibm
aix *
windriver
bsdos *
hp
hp-ux *
sgi
irix *
linux
linux kernel *
sun
solaris *
ibm
os2 *
microsoft
windows 95 *
data_general
dg ux *
microsoft
windows nt 4.0
microsoft
windows 98 *
novell
netware *
sco
unix *
microsoft
windows 98se *
microsoft
windows 2000 *
cisco
ios *
sco
unixware 7.1
microsoft
windows me *
compaq
tru64 *
microsoft
windows xp
apple
mac os *
microsoft
windows 2003_server