Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Firewalls >> Usable remote proxy on any port


Vulnerability Assessment Details

Usable remote proxy on any port

Vulnerability Assessment Summary
Acertains if we can use the remote web proxy against any port

Detailed Explanation for this Vulnerability Assessment
The proxy, permits everyone to perform requests
against arbitrary ports, like
'GET http://cvs.nessus.org:110'.
This problem may permit attackers to go through your
firewall, by connecting to sensitive ports like 25 (sendmail)
using your proxy. In addition to that, your proxy may be used
to perform attacks against other networks.

Solution: reconfigure your proxy so that it only accepts
connections against non-dangerous ports (> 1024).

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

USB Flash Drive Memory Stick Pen Drive, Credit Bank Card Design, White
$6.99
USB Flash Drive Memory Stick Pen Drive, Credit Bank Card Design, White pictureANDROID FLASHED TO UNLIMITED 3G VERIZON $5 A MONTH 2 MONTHS FREE [FREE REFLASH]
$69.95
ANDROID FLASHED TO UNLIMITED 3G VERIZON $5 A MONTH 2 MONTHS FREE [FREE REFLASH] picture2 LOTS of WYSE Thin Client 2GB RAM Flash SX0 Pn # 849150-01L 902169-01L S10
$38.0
2 LOTS of WYSE Thin Client 2GB RAM Flash SX0  Pn # 849150-01L 902169-01L  S10  pictureOTG 64GB i Flash Dual USB Memory Drive U Disk For Samsung S7 IOS iPhone iPad/PC
$0.01
OTG 64GB i Flash Dual USB Memory Drive U Disk For Samsung S7 IOS iPhone iPad/PC picture


Discussions

No Discussions have been posted on this vulnerability.