Livingston PortMaster ComOS Malformed Packet Remote DoS

high Nessus Plugin ID 10182

Synopsis

The remote server is vulnerable to a denial of service.

Description

It was possible to crash the remote Livingston portmaster by overflowing its buffers by sending several times the two chars :

0xFF 0xF3

An attacker may use this flaw to prevent you to use your internet access.

Solution

Contact your vendor for a patch.

Plugin Details

Severity: High

ID: 10182

File Name: pmcrash.nasl

Version: 1.25

Type: remote

Published: 8/22/1999

Updated: 7/27/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 9/10/1995

Reference Information

CVE: CVE-1999-0218

BID: 2225