ID CVE-2000-0908
Summary BrowseGate 2.80 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via long Authorization or Referer MIME headers in the HTTP request.
References
Vulnerable Configurations
  • cpe:2.3:a:netcplus:browsegate:2.80
    cpe:2.3:a:netcplus:browsegate:2.80
CVSS
Base: 5.0 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
exploit-db via4
description NetcPlus BrowseGate 2.80 DoS Vulnerability. CVE-2000-0908. Dos exploit for windows platform
id EDB-ID:20233
last seen 2016-02-02
modified 2000-09-21
published 2000-09-21
reporter Delphis Consulting
source https://www.exploit-db.com/download/20233/
title NetcPlus BrowseGate 2.80 DoS Vulnerability
nessus via4
NASL family Web Servers
NASL id BROWSEGATE_HTTP_OVERFLOWS.NASL
description It is possible to kill the remote server by sending it an invalid request with too long HTTP headers (Authorization and Referer). BrowseGate proxy is known to be vulnerable to this flaw. An attacker could exploit this vulnerability to cause the web server to crash continually or to execute arbitrary code on the system.
last seen 2019-02-21
modified 2018-06-29
plugin id 11130
published 2002-09-21
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=11130
title BrowseGate HTTP MIME Headers Remote Overflow
refmap via4
bid 1702
bugtraq 20000921 DST2K0031: DoS in BrowseGate(Home) v2.80(H)
confirm http://www.netcplus.com/browsegate.htm#BGLatest
win2ksec 20000921 DST2K0031: DoS in BrowseGate(Home) v2.80(H)
xf browsegate-http-dos(5270)
Last major update 17-10-2016 - 22:07
Published 19-12-2000 - 00:00
Last modified 09-10-2017 - 21:29
Back to Top