Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Connect back to SOCKS5 server


Vulnerability Assessment Details

Connect back to SOCKS5 server

Vulnerability Assessment Summary
Connect back to SOCKS5 proxy

Detailed Explanation for this Vulnerability Assessment

It was possible to connect to the SOCKS5 server
through itself.
This permit anybody to saturate the proxy CPU, memory or
file descriptors.

Solution: reconfigure your proxy so that it refuses connections to itself
Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi

Cables, Connectors

NEW CISCO 8841 IP VoIP PHONE CP-8841-K9 + BASE STAND + AC ADAPTER - COMPLETE SET
$120.0
NEW CISCO 8841 IP VoIP PHONE CP-8841-K9 + BASE STAND + AC ADAPTER - COMPLETE SET pictureLOT OF 5 OEM CISCO MERAKI POE INJECTOR POWER SUPPLY GIGABIT POE20U-560(G) 56V
$49.95
LOT OF 5 OEM CISCO MERAKI POE INJECTOR POWER SUPPLY GIGABIT POE20U-560(G) 56V pictureCisco 675 DSL Router w/ Manuals, Cables and CD
$14.95
Cisco 675 DSL Router w/ Manuals, Cables and CD pictureCisco Meraki MR32 Cloud Managed Wireless Access Point - No License
$50.0
Cisco Meraki MR32 Cloud Managed Wireless Access Point - No License picture


Discussions

No Discussions have been posted on this vulnerability.