NukeNabber allows remote attackers to cause a denial of service by connecting to the NukeNabber port (1080) without sending any data, which causes the CPU usage to rise to 100% from the report.exe program that is executed upon the connection.
References
Configurations
History
20 Nov 2024, 23:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=91063407332594&w=2 - | |
References | () http://www.dynamsol.com/puppet/text/new.txt - URL Repurposed | |
References | () http://www.securityfocus.com/archive/1/11131 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/1540 - |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.dynamsol.com/puppet/text/new.txt - URL Repurposed |
Information
Published : 1998-11-05 05:00
Updated : 2024-11-20 23:30
NVD link : CVE-1999-1284
Mitre link : CVE-1999-1284
CVE.ORG link : CVE-1999-1284
JSON object : View
Products Affected
puppets_place
- nukenabber
CWE