{"vuid":"VU#990200","idnumber":"990200","name":"Macromedia JRun Server is vulnerable to buffer overflow","keywords":["Macromedia","JRun Server","JRun web server","buffer overflow","verbose debug mode","denial of service","DoS"],"overview":"A buffer overflow vulnerability exists in the Macromedia JRun web server that may allow an attacker to cause a denial-of-service condition.","clean_desc":"JRun is an application server that works with most popular web servers, such as Apache and IIS. The JRun web server is vulnerable to a buffer overflow when it is placed in verbose debugging mode. Although this mode is disbled by default, if accidently left on an attacker may be able to crash the web server.","impact":"An attacker may be able to crash the web server resulting in a denial-of-service condition.","resolution":"Apply Patch For JRun versions 3.0 and 3.1, a patch is available at: http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html. For JRun version 4.0, apply the latest updater: http://www.macromedia.com/support/jrun/updaters.html.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Macromedia Security Bulletin \nMPSB04-08","author":"This document was written by Jeff Gennari.","public":["http://secunia.com/advisories/12647/","http://secunia.com/advisories/12638/","http://www.macromedia.com/devnet/security/security_zone/mpsb04-08.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-09-27T13:11:15Z","publicdate":"2004-09-23T00:00:00Z","datefirstpublished":"2004-10-12T16:52:10Z","dateupdated":"2004-10-14T15:20:10Z","revision":36,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"14","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"3","cam_easeofexploitation":"1","cam_attackeraccessrequired":"5","cam_scorecurrent":"0.0759375","cam_scorecurrentwidelyknown":"0.10125","cam_scorecurrentwidelyknownexploited":"0.185625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.0759375,"vulnote":null}