![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.105485 |
Kategorie: | CISCO |
Titel: | Cisco Integrated Management Controller Denial of Service Vulnerability |
Zusammenfassung: | A vulnerability in Cisco Integrated Management Controller (IMC) could allow an authenticated,; remote attacker to make the IMC IP interface inaccessible. |
Beschreibung: | Summary: A vulnerability in Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker to make the IMC IP interface inaccessible. Vulnerability Insight: The vulnerability is due to incomplete sanitization of input for certain parameters. Vulnerability Impact: An attacker could exploit this vulnerability by sending a crafted HTTP request to the IMC. A successful exploit could allow the attacker to cause the IMC to become inaccessible via the IP interface, resulting in a denial of service (DoS) condition. Affected Software/OS: Cisco IMC releases prior to 2.0(9) are vulnerable. Solution: See vendor advisory CVSS Score: 6.8 CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-6399 BugTraq ID: 108851 http://www.securityfocus.com/bid/108851 BugTraq ID: 79031 http://www.securityfocus.com/bid/79031 Cisco Security Advisory: 20151211 Cisco Integrated Management Controller Denial of Service Vulnerability http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151211-imc http://www.securitytracker.com/id/1038475 |
Copyright | Copyright (C) 2015 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |