Vulnerability Details : CVE-2002-1061
Multiple buffer overflows in Thomas Hauck Jana Server 2.x through 2.2.1, and 1.4.6 and earlier, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) an HTTP GET request with a long major version number, (2) an HTTP GET request to the HTTP proxy on port 3128 with a long major version number, (3) a long OK reply from a POP3 server, and (4) a long SMTP server response.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2002-1061
- cpe:2.3:a:t._hauck:jana_web_server:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:t._hauck:jana_web_server:1.45:*:*:*:*:*:*:*
- cpe:2.3:a:t._hauck:jana_web_server:1.46:*:*:*:*:*:*:*
- cpe:2.3:a:t._hauck:jana_web_server:2.0_beta1:*:*:*:*:*:*:*
- cpe:2.3:a:t._hauck:jana_web_server:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:t._hauck:jana_web_server:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:t._hauck:jana_web_server:2.0_beta2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-1061
4.56%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1061
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-1061
-
http://archives.neohapsis.com/archives/bugtraq/2002-07/0329.html
-
http://www.iss.net/security_center/static/9686.php
Vendor Advisory
-
http://www.iss.net/security_center/static/9683.php
-
http://www.securityfocus.com/bid/5322
Vendor Advisory
-
http://www.securityfocus.com/bid/5324
-
http://www.iss.net/security_center/static/9685.php
Vendor Advisory
-
http://www.securityfocus.com/bid/5319
-
http://www.iss.net/security_center/static/9682.php
-
http://www.securityfocus.com/bid/5320
Patch;Vendor Advisory
Jump to