Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.106455 |
Categoría: | CISCO |
Título: | Cisco Web Security Appliance HTTP URL Denial of Service Vulnerability |
Resumen: | A vulnerability in HTTP URL parsing of Cisco AsyncOS for Cisco Web Security;Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) vulnerability;due to the proxy process unexpectedly restarting. |
Descripción: | Summary: A vulnerability in HTTP URL parsing of Cisco AsyncOS for Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) vulnerability due to the proxy process unexpectedly restarting. Vulnerability Insight: The vulnerability is due to improper input validation of the HTTP URL string. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. Vulnerability Impact: An exploit could allow the attacker to cause a DoS condition due to the proxy process restarting. Solution: See the referenced vendor advisory for a solution. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-6469 BugTraq ID: 94775 http://www.securityfocus.com/bid/94775 |
Copyright | Copyright (C) 2016 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |