Vulnerability CVE-2006-0911


Published: 2006-02-28   Modified: 2012-02-12

Description:
NmService.exe in Ipswitch WhatsUp Professional 2006 allows remote attackers to cause a denial of service (CPU consumption) via crafted requests to Login.asp, possibly involving the (1) "In]" and (2) "b;tnLogIn" parameters, or (3) malformed btnLogIn parameters, possibly involving missing "[" (open bracket) or "[" (closing bracket) characters, as demonstrated by "&btnLogIn=[Log&In]=&" or "&b;tnLogIn=[Log&In]=&" in the URL. NOTE: due to the lack of diagnosis by the original researcher, the precise nature of the vulnerability is unclear.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
IpSwitch WhatsUp Professional 2006 DoS
Josh Zlatin
23.02.2006

Type:

CWE-399

(Resource Management Errors)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Ipswitch -> Whatsup 

 References:
http://securityreason.com/securityalert/472
http://www.securityfocus.com/archive/1/425780/100/0/threaded
http://www.securityfocus.com/bid/16771
http://www.vupen.com/english/advisories/2006/0704
http://zur.homelinux.com/Advisories/ipswitch_dos.txt
https://exchange.xforce.ibmcloud.com/vulnerabilities/24864

Copyright 2024, cxsecurity.com

 

Back to Top