First published: Thu Sep 21 2000(Updated: )
The administration interface for the dwhttpd web server in Solaris AnswerBook2 does not properly authenticate requests to its supporting CGI scripts, which allows remote attackers to add user accounts to the interface by directly calling the admin CGI script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Solaris Answerbook2 | =1.4 | |
Sun Solaris Answerbook2 | =1.4.1 | |
Sun Solaris Answerbook2 | =1.4.2 | |
Sun Solaris Answerbook2 | =1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0696 has a high severity due to the potential for unauthorized account creation.
To fix CVE-2000-0696, secure the administration interface by implementing proper authentication measures.
CVE-2000-0696 affects Solaris AnswerBook2 versions 1.3, 1.4, 1.4.1, and 1.4.2.
Yes, CVE-2000-0696 can be exploited remotely as it allows attackers to access the admin CGI script without proper authentication.
Exploitation of CVE-2000-0696 can lead to unauthorized user account creation, compromising the system's security.