ID CVE-1999-0751
Summary Buffer overflow in Accept command in Netscape Enterprise Server 3.6 with the SSL Handshake Patch.
References
Vulnerable Configurations
  • Netscape Netscape Enterprise Server 3.5.1
    cpe:2.3:a:netscape:enterprise_server:3.5.1
  • cpe:2.3:a:netscape:enterprise_server:3.6:sp2
    cpe:2.3:a:netscape:enterprise_server:3.6:sp2
CVSS
Base: 5.0 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
exploit-db via4
description Netscape Enterprise Server 3.51/3.6 SP2 Accept Buffer Overflow Vulnerability. CVE-1999-0751. Remote exploits for multiple platform
id EDB-ID:19493
last seen 2016-02-02
modified 1999-09-13
published 1999-09-13
reporter Nobuo Miwa
source https://www.exploit-db.com/download/19493/
title Netscape Enterprise Server 3.51/3.6 SP2 Accept Buffer Overflow Vulnerability
nessus via4
NASL family Web Servers
NASL id NETSCAPE_ACCEPT_OVERFLOW.NASL
description The remote web server seems to crash when it is issued a too long argument to the 'Accept:' command : Example : GET / HTTP/1.0 Accept: /gif This may allow an attacker to execute arbitrary code on the remote system.
last seen 2019-02-21
modified 2018-07-16
plugin id 10154
published 1999-09-12
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=10154
title Netscape Enterprise Server Accept Header Remote Overflow
refmap via4
bid 631
bugtraq 19990913 Accept overflow on Netscape Enterprise Server 3.6 SP2
xf netscape-accept-bo(3256)
Last major update 09-09-2008 - 08:35
Published 13-09-1999 - 00:00
Last modified 02-05-2018 - 21:29
Back to Top