Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Firewalls >> Usable remote proxy on any port


Vulnerability Assessment Details

Usable remote proxy on any port

Vulnerability Assessment Summary
Acertains if we can use the remote web proxy against any port

Detailed Explanation for this Vulnerability Assessment
The proxy, permits everyone to perform requests
against arbitrary ports, like
'GET http://cvs.nessus.org:110'.
This problem may permit attackers to go through your
firewall, by connecting to sensitive ports like 25 (sendmail)
using your proxy. In addition to that, your proxy may be used
to perform attacks against other networks.

Solution: reconfigure your proxy so that it only accepts
connections against non-dangerous ports (> 1024).

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

Vintage Original Apple Macintosh Mac 128K M0100 Mouse Tested Working Order
$59.99
Vintage Original Apple Macintosh Mac 128K M0100 Mouse Tested Working Order pictureVintage Apple II Series Educational Vision Software Lot of 5 Used 5.25" Must See
$40.0
Vintage Apple II Series Educational Vision Software Lot of 5 Used 5.25Vintage Apple Macintosh Mac 128K M0110 Keyboard & Cord Tested Working Order
$79.99
Vintage Apple Macintosh Mac 128K M0110 Keyboard & Cord Tested Working Order pictureVintage Indigo Blue Apple iMac M5521 Computer for Parts, Repair or iMac Aquarium
$25.0
Vintage Indigo Blue Apple iMac M5521 Computer for Parts, Repair or iMac Aquarium picture


Discussions

No Discussions have been posted on this vulnerability.