Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Connect back to SOCKS5 server


Vulnerability Assessment Details

Connect back to SOCKS5 server

Vulnerability Assessment Summary
Connect back to SOCKS5 proxy

Detailed Explanation for this Vulnerability Assessment

It was possible to connect to the SOCKS5 server
through itself.
This permit anybody to saturate the proxy CPU, memory or
file descriptors.

Solution: reconfigure your proxy so that it refuses connections to itself
Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi

Cables, Connectors

CISCO - HW WIRELESS AIR-ANT2513P4M-N= AIRONET 2.4GHZ/5GHZ PATCH 13DBI
$1140.56
CISCO - HW WIRELESS AIR-ANT2513P4M-N= AIRONET 2.4GHZ/5GHZ PATCH 13DBI pictureSTARTECH.COM SFP10GLRST 10 GIGABIT FIBER SFP+ - CISCO
$328.01
STARTECH.COM SFP10GLRST 10 GIGABIT FIBER SFP+ - CISCO pictureCisco 7606 rack mounted router, fully loaded
$250.0
Cisco 7606 rack mounted router, fully loaded pictureINVAXON 2 Pack 100% Compatible for Cisco GLC-T Copper SFP Transceiver 1000BASE-T
$44.55
INVAXON 2 Pack 100% Compatible for Cisco GLC-T Copper SFP Transceiver 1000BASE-T picture


Discussions

No Discussions have been posted on this vulnerability.