|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Denial of Service >> Proxy accepts CONNECT requests to itself Vulnerability Assessment Details
|
Proxy accepts CONNECT requests to itself |
||
Connects back to the web proxy through itself Detailed Explanation for this Vulnerability Assessment The proxy permits the users to perform repeated CONNECT requests to itself. This permit anybody to saturate the proxy CPU, memory or file descriptors. ** Note that if the proxy limits the number of connections ** from a single IP (e.g. acl maxconn with Squid), it is ** protected against saturation and you may ignore this alert. Solution: reconfigure your proxy so that it refuses CONNECT requests to itself. Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi |
||
Cables, Connectors |
Vintage AT&T PC6300 Desktop PC NO Power, Parts or Repair
$59.99
Vintage Compaq Concerto 2840A Laptop Tablet *PARTS*
$80.00
Vintage Commodore SX-64 Computer - Nice Working Condition / Read for Details
$549.99
60s 70s 80s CLASSIC ROCK Music Collection, 1600 songs, Vintage, Lot, Over 80 hrs
$33.99
Vintage Custom 486DX4 100 MHz PC w/ Cirrus Logic, Sound Blaster 32, & Win 3.11
$395.00
Kenneth Cole New York 520115 Vintage Black Laptop Briefcase Messenger Bag
$19.99
Vintage Apple Macintosh II System
$350.00
Vintage Apple M0115 White Portable Standard Extended Keyboard Box
$49.99
Vintage Commodore Amiga Trumpcard Pro Controller Card
$99.99
Vintage Industrial 1984 Micro Systems - Z80 CPX-BMX Board 128K
$115.00
|
||
No Discussions have been posted on this vulnerability. |