Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.106305 |
Kategorie: | CISCO |
Titel: | Cisco IOS Software H.323 Message Validation Denial of Service Vulnerability |
Zusammenfassung: | A vulnerability in the H.323 subsystem of Cisco IOS Software could allow an;unauthenticated, remote attacker to create a denial of service (DoS) condition on an affected device. |
Beschreibung: | Summary: A vulnerability in the H.323 subsystem of Cisco IOS Software could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition on an affected device. Vulnerability Insight: The vulnerability is due to a failure to properly validate certain fields in an H.323 protocol suite message. When processing the malicious message, the affected device may attempt to access an invalid memory region, resulting in a crash. Vulnerability Impact: An attacker who can submit an H.323 packet designed to trigger the vulnerability could cause the affected device to crash and restart. Solution: See the referenced vendor advisory for a solution. CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-6384 BugTraq ID: 93209 http://www.securityfocus.com/bid/93209 Cisco Security Advisory: 20160928 Cisco IOS and IOS XE Software H.323 Message Validation Denial of Service Vulnerability http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160928-h323 http://www.securitytracker.com/id/1036914 |
Copyright | Copyright (C) 2016 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |