3com RAS 1500 / Wyse Winterm Malformed Packet Remote DoS

high Nessus Plugin ID 11475

Language:

Synopsis

The remote host is vulnerable to a remote denial of service attack.

Description

It was possible to crash the remote host by sending a specially crafted IP packet with a null length for IP option #0xE4

An attacker may use this flaw to prevent the remote host from accomplishing its job properly.

Solution

The solution is unknown at this time.

See Also

http://archive.cert.uni-stuttgart.de/bugtraq/2003/03/msg00321.html

Plugin Details

Severity: High

ID: 11475

File Name: 3com_ras_crash.nasl

Version: 1.21

Type: remote

Published: 3/25/2003

Updated: 3/6/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.5

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 3/24/2003

Reference Information

CVE: CVE-2005-2577, CVE-2006-0309

BID: 7175, 14536