Nessus Plugin #10348
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
ows-bin
- Family:
- CGI abuses
- Category:
- infos
- Copyright:
- This script is Copyright (C) 2000 Noam Rathaus
- Summary:
- Checks if ows-bin is vulnerable
- Version:
- $Revision: 1.14 $
- Cve_id:
- CVE-2000-0169
- Bugtraq_id:
- 1053
- Xrefs:
- -
- Description:
-
Oracle's Web Listener (a component of the Oracle Application Server),
is installed and can be used by a remote attacker to run arbitrary
commands on the web server.
Read more about this hole at:
http://www.securiteam.com/windowsntfocus/Oracle_Web_Listener_4_0_x_CGI_vulnerability.html
Solution : If 'ows-bin' is the default CGI directory used by the Oracle Application Server Manager,
then remove the ows-bin virtual directory or point it to a more benign directory.
If 'ows-bin' is not the default then verify that there are no batch files in this directory.
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.