This module shuts down the EMC RepliStor Server because it fails to properly handle user-supplied malformed packets.
This module exploits a vulnerability in the ClearSCADA Server service by sending a malformed packet to the 5481/TCP port to crash the application.
The eCS component (ECSQdmn.exe) in CA ETrust Secure Content Manager 8.0 and CA Gateway Security 8.1 allows remote attackers to cause a denial of service (crash) via a crafted request to port 1882, involving an incorrect integer calculation and a heap-based buffer overflow.
This module exploits a vulnerability in Citrix EdgeSight Software, when a crafted package is send to port 18747.
Cisco routers are configured to process and accept Internet Protocol version 4 (IPv4) packets by default. IPv4 packets handled by the processor on a Cisco IOS device with protocol types of 53 (SWIPE), 55 (IP Mobility), or 77 (Sun ND), all with Time-to-Live (TTL) values of 1 or 0, and 103 (Protocol Independent Multicast - PIM) with any TTL value, may force the device to incorrectly flag the input queue on an interface as full. A full input queue will stop the device from processing inbound traffic on that interface and may result in routing protocols dropping due to dead timers. Routers that have the PIM process running are not affected by traffic with protocol type 103. This process will be created when PIM is configured on any interface of the router. An interface with PIM enabled will have one of the following three commands in the interface configuration: ip pim dense-mode, ip pim sparse-mode, or ip pim sparse-dense-mode. On a blocked Ethernet interface, Address Resolution Protocol (ARP) times out after a default time of four hours, and no traffic can be processed. The device must be rebooted to clear the input queue on the interface, and will not reload without user intervention. The attack may be repeated on all interfaces causing the router to be remotely inaccessible.
This module shuts down the Cerberus FTP Server because it fails to properly handle user-supplied input with an overly long USER command.
This module shuts down the Blackmoon FTP Server because it fails to properly handle user-supplied malformed packets.
This module hangs the BakBone NetVault SmartDisk Server because it fails to properly handle user-supplied malformed packets.
This module exploits a vulnerability in Avast Internet Security driver (aswFW.sys). The IOCTL handler in the aswFW.sys device driver allows local users to overwrite memory via malformed parameters.
This module exploits a vulnerability in Avast Internet Security driver (aswFW.sys). The IOCTL handler in the aswFW.sys device driver allows local users to overwrite memory via malformed parameters.
Pagination
- Previous page
- Page 17
- Next page