[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Win : ISS Security Advisory: Buffer Overflow in NetscapeEnterprise and FastTrack Web Servers
This is all kind of ominous, and we have a bunch of Irix machines
running the netscape web server, I think - many unnecessarily. Sadly, I
don't think we can count on netscape to be forthcoming about this.
Could you please go to the machines running the netscape web server and
turn it off on the ones that don't actually need it?
I'm leaving a copy of the web-80 entries from ~oacstats/composite in
/tmp on nsc-1.oac, to help you identify which machines are running a
-------- Original Message --------
Subject: Re: [Fwd: ISS Security Advisory: Buffer Overflow in
NetscapeEnterprise and FastTrack Web Servers]
Date: Thu, 26 Aug 1999 15:23:12 -0400
From: X-Force <xforce@ISS.NET>
Reply-To: X-Force <xforce@ISS.NET>
Erik Fichtner wrote:
> Is this vulnerability in other versions of Enterprise server?
We tested the vulnerability against the current releases of Enterprise
and Fasttrack. Earlier versions may be vulnerable, but they were not
> Does it exist on all platforms?
No, our advisory effects only NT, Solaris was tested against and found
not vulnerable. AIX and other platforms were not tested against and
these platforms potentially could be vulnerable.
> Is this an issue only with the SSL server (SSL Handshake? huh? what does
> THAT have to do with a GET request?) or does this affect the entire
Netscape decided to combine the GET overflow patch in with an SSL
problem. This vulnerability affects the entire server. Netscapes
handles their patch bundling, we have no involvment with that.
> Are patches available for previous versions of Enterprise server?
Not that we know of, If previous versions are found to be vulnerable
Netscape should be contacted and will issue a patch at that time.
Internet Security Systems, Inc.
(678) 443-6000 / http://xforce.iss.net/
Adaptive Network Security for the Enterprise