Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Firewalls >> Usable remote proxy on any port


Vulnerability Assessment Details

Usable remote proxy on any port

Vulnerability Assessment Summary
Acertains if we can use the remote web proxy against any port

Detailed Explanation for this Vulnerability Assessment
The proxy, permits everyone to perform requests
against arbitrary ports, like
'GET http://cvs.nessus.org:110'.
This problem may permit attackers to go through your
firewall, by connecting to sensitive ports like 25 (sendmail)
using your proxy. In addition to that, your proxy may be used
to perform attacks against other networks.

Solution: reconfigure your proxy so that it only accepts
connections against non-dangerous ports (> 1024).

Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

VINTAGE APPLE MACINTOSH SE COMPUTER ANALOG BOARD 820-0206-B, WORKING
$34.95
VINTAGE APPLE MACINTOSH SE COMPUTER ANALOG BOARD 820-0206-B, WORKING pictureG1/4 Computer Thermodetector Water Cooling Analog Water Temperature Gauge Meter
$10.66
G1/4 Computer Thermodetector Water Cooling Analog Water Temperature Gauge Meter pictureComputer Boards Inc CIO-DAS8JR/16 Digital I/O Analog Input Board 508-261-1123
$199.95
Computer Boards Inc CIO-DAS8JR/16 Digital I/O Analog Input Board 508-261-1123 pictureDigital to Analog Headphone Amplifier 2 Stage EQ Computer Audio Sound Gear
$47.87
Digital to Analog Headphone Amplifier 2 Stage EQ Computer Audio Sound Gear picture


Discussions

No Discussions have been posted on this vulnerability.