First published: Thu Aug 31 2006(Updated: )
Paessler IPCheck Server Monitor before 5.3.3.639/640 does not properly implement a "list of acceptable host IP addresses in the probe settings," which has unknown impact and attack vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IPCheck Server Monitor | <=5.3.2.616_617 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-4461 is currently unknown due to the lack of specific details on the impact and attack vectors.
To address CVE-2006-4461, it is recommended to upgrade to Paessler IPCheck Server Monitor version 5.3.3.639 or later.
CVE-2006-4461 affects versions of Paessler IPCheck Server Monitor prior to 5.3.3.639.
CVE-2006-4461 is related to improper implementation of IP address filtering in the probe settings.
While specific attack vectors are unknown, the nature of the vulnerability suggests potential for remote exploitation.