Summary
This host is running Zope, and is prone to Denial of Service Vulnerability.
Impact
Successful exploitation allows remote authenticated users to cause denial of service or resource exhaustion.
Impact Level: Application
Solution
Update Zope to higher version,
http://www.zope.org/Products/Zope/
or
Apply available patch,
http://www.zope.org/Products/Zope/Hotfix-2008-08-12/
*****
NOTE: Ignore this warning if above mentioned patch is already applied.
*****
Insight
Zope server allows improper strings to be passed via certain raise and import commands.
Affected
Zope Versions 2.x - 2.11.2 on Linux.
Severity
Classification
-
CVE CVE-2008-5102 -
CVSS Base Score: 4.0
AV:N/AC:L/Au:S/C:N/I:N/A:P
Related Vulnerabilities
- ClamAV 'cli_pdf()' and 'cli_scanicon()' Denial of Service Vulnerabilities (Win
- Connect back to SOCKS4 server
- Firefox Browser Libxul Memory Leak Remote DoS Vulnerability - Linux
- Firebird SQL 'op_connect_request' Denial Of Service Vulnerability (Win)
- Apple Safari 'WebKit.dll' Stack Consumption Vulnerability