|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> FTP >> TYPSoft empty username DoS Vulnerability Assessment Details
|
TYPSoft empty username DoS |
||
Checks for TYPSoft FTP server empty username DoS Detailed Explanation for this Vulnerability Assessment The remote host seems to be running TYPSoft FTP server, version 1.10. This version is prone to a remote denial of service flaw. By sending an empty login username, a possible hacker can cause the ftp server to crash, denying service to legitimate users. Solution : Use a different FTP server or upgrade to the newest version. Network Security Threat Level: High Networks Security ID: 9573 Vulnerability Assessment Copyright: This script is Copyright (C) 2004 David Maciejak |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |