Re: Another ZEUS Server web admin XSS!
Date: 30 May 2003 15:06:56 -0000 To: firstname.lastname@example.org('binary' encoding is not supported, stored as-is) In-Reply-To: <email@example.com>
Zeus Technology, 30th May 2003.
"Another ZEUS Server web admin XSS!" vendor response
On May 29th 2003, a cross-site-scripting attack against
Administration Server was reported on bugtraq (incident
Server web admin XSS!").
Zeus Technology has investigated this report and
confirm that a cross-
site-scripting exploit is possible under very limited
vulnerability is present in Zeus Web Server version
4.2r2 and earlier.
Zeus have product patches which will be available
shortly through Zeus's
support channel (firstname.lastname@example.org).
These patches will be included in the next revision of
Zeus Web Server
(4.2r3) when it is released.
Zeus Technology continue to advise that the
Administration Server is
shut down when not in use as a matter of routine.
Zeus Technology work closely with customers,
professionals and other researchers to ensure its
products are secure
and free from defects. Any security-related comments
email@example.com, or through any other means are
treated with the
utmost attention. Zeus Technology regret that the
details of the exploit before contacting Zeus and
allowing Zeus to
prepare and distribute a fix.
-- firstname.lastname@example.org Zeus Technology Ltd Security Response Team Universally Serving the Net Tel:+44(0)1223 525000 Fax:+44(0)1223 525100 http://www.zeus.com/ Zeus House, Cowley Road, Cambridge, CB4 0ZT, ENGLAND