This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Sun First view 2004-12-31
Product One Web Server Last view 2010-02-25
Version 4.1 Type Application
Update sp11  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:sun:one_web_server

Activity : Overall

Related : CVE

  Date Alert Description
5 2010-02-25 CVE-2003-1589

Unspecified vulnerability in Sun ONE (aka iPlanet) Web Server 4.1 before SP13 and 6.0 before SP6 on Windows allows attackers to cause a denial of service (daemon crash) via unknown vectors.

4.3 2010-02-05 CVE-2003-1578

Sun ONE (aka iPlanet) Web Server 4.1 through SP12 and 6.0 through SP5, when DNS resolution is enabled for client IP addresses, allows remote attackers to hide HTTP requests from the log-preview functionality by accompanying the requests with crafted DNS responses specifying a domain name beginning with a "format=" substring, related to an "Inverse Lookup Log Corruption (ILLC)" issue.

2.6 2010-02-05 CVE-2003-1577

Sun ONE (aka iPlanet) Web Server 4.1 through SP12 and 6.0 through SP5, when DNS resolution is enabled for client IP addresses, allows remote attackers to inject arbitrary text into log files, and conduct cross-site scripting (XSS) attacks involving the iPlanet Log Analyzer, via an HTTP request in conjunction with a crafted DNS response, related to an "Inverse Lookup Log Corruption (ILLC)" issue, a different vulnerability than CVE-2002-1315 and CVE-2002-1316.

5.8 2009-06-01 CVE-2004-2763

The default configuration of Sun ONE/iPlanet Web Server 4.1 SP1 through SP12 and 6.0 SP1 through SP5 responds to the HTTP TRACE request, which can allow remote attackers to steal information using cross-site tracing (XST) attacks in applications that are vulnerable to cross-site scripting.

6.8 2006-05-19 CVE-2006-2501

Cross-site scripting (XSS) vulnerability in Sun ONE Web Server 6.0 SP9 and earlier, Java System Web Server 6.1 SP4 and earlier, Sun ONE Application Server 7 Platform and Standard Edition Update 6 and earlier, and Java System Application Server 7 2004Q2 Standard and Enterprise Edition Update 2 and earlier, allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, possibly involving error messages.

7.5 2004-12-31 CVE-2004-0826

Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.

CWE : Common Weakness Enumeration

%idName
50% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
50% (1) CWE-16 Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-47 Buffer Overflow via Parameter Expansion

Open Source Vulnerability Database (OSVDB)

id Description
62234 Sun ONE Web Server iPlanet Log Analyzer Crafted DNS Response Inverse Lookup L...
62233 Sun ONE Web Server Crafted DNS Response format= Substring Log-preview Functio...
25634 Sun ONE/Java System Web Server Error Page XSS
11408 Sun Java System Application Server HTTP TRACE Response XSS
9116 Netscape Network Security Services (NSS) Library SSLv2 Challenge Overflow
2891 Sun ONE Web Server Unspecified DoS

OpenVAS Exploits

id Description
2008-09-04 Name : FreeBSD Ports: nss
File : nvt/freebsd_nss.nasl
2005-11-03 Name : NSS Library SSLv2 Challenge Overflow
File : nvt/sslv2_hello_overflow.nasl

Snort® IPS/IDS

Date Description
2014-01-10 SSLv2 Client_Hello Challenge Length overflow attempt
RuleID : 2656-community - Type : SERVER-WEBAPP - Revision : 22
2014-01-10 SSLv2 Client_Hello Challenge Length overflow attempt
RuleID : 2656 - Type : SERVER-WEBAPP - Revision : 22
2014-01-10 SSLv1 Client_Hello Challenge Length overflow attempt
RuleID : 15897 - Type : WEB-MISC - Revision : 4

Nessus® Vulnerability Scanner

id Description
2009-04-23 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_207f8ff3f69711d881b0000347a4fa7d.nasl - Type: ACT_GATHER_INFO
2004-08-24 Name: The remote service is susceptible to a buffer overflow attack.
File: sslv2_hello_overflow.nasl - Type: ACT_MIXED_ATTACK