First published: Fri Dec 16 2011(Updated: )
The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 does not disable the SSL 2.0 protocol, which makes it easier for remote attackers to conduct spoofing attacks by leveraging protocol weaknesses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.3.1_build1013110726.09 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4746 has a medium severity rating due to its potential for spoofing attacks.
To fix CVE-2011-4746, disable the SSL 2.0 protocol in the Parallels Plesk Panel settings.
CVE-2011-4746 specifically affects Parallels Plesk Panel version 10.3.1_build1013110726.09.
Yes, CVE-2011-4746 can undermine the security of your system by allowing remote spoofing attacks.
As of the last update, there is no specific patch for CVE-2011-4746, so disabling SSL 2.0 is the recommended action.