![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10266 |
Category: | Denial of Service |
Title: | UDP null size going to SNMP DoS |
Summary: | NOSUMMARY |
Description: | Description: It was possible to crash either the remote host or the firewall in between us and the remote host by sending an UDP packet of null size going to port 161 (snmp) This flaw may allow an attacker to shut down your network. Solution : contact your firewall vendor if it was the firewall which crashed, or filter incoming UDP traffic if the remote host crashed. Risk factor : Medium CVSS Score: 5.0 |
Cross-Ref: |
BugTraq ID: 1009 Common Vulnerability Exposure (CVE) ID: CVE-2000-0221 http://www.securityfocus.com/bid/1009 Bugtraq: 20000225 Scorpion Marlin (Google Search) |
Copyright | This script is Copyright (C) 2000 Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |