ID CVE-2001-0612
Type cve
Reporter NVD
Modified 2017-10-09T21:29:48
Description
McAfee Remote Desktop 3.0 and earlier allows remote attackers to cause a denial of service (crash) via a large number of packets to port 5045.
{"id": "CVE-2001-0612", "bulletinFamily": "NVD", "title": "CVE-2001-0612", "description": "McAfee Remote Desktop 3.0 and earlier allows remote attackers to cause a denial of service (crash) via a large number of packets to port 5045.", "published": "2001-08-22T00:00:00", "modified": "2017-10-09T21:29:48", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0612", "reporter": "NVD", "references": ["http://www.securityfocus.com/bid/2726", "http://archives.neohapsis.com/archives/bugtraq/2001-05/0158.html", "https://exchange.xforce.ibmcloud.com/vulnerabilities/6547"], "cvelist": ["CVE-2001-0612"], "type": "cve", "lastseen": "2017-10-10T10:34:43", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:mcafee:remote_desktop_32:2.1.2", "cpe:/a:mcafee:remote_desktop_32:3.0"], "cvelist": ["CVE-2001-0612"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "description": "McAfee Remote Desktop 3.0 and earlier allows remote attackers to cause a denial of service (crash) via a large number of packets to port 5045.", "edition": 1, "enchantments": {}, "hash": "e2400e3c4a5ece0aa06aabac0a11e7cfb4857b944beff2d22c3aee2fa0022da1", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "f9a6fe1f906f3c829f54bfdab76b879d", "key": "cvelist"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "8740592531bfc67e4fa5e042a503db03", "key": "modified"}, {"hash": "c63cc18513a473a6e11c5811e37baa23", "key": "cpe"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "a927e8a9b91fb2b961fc72512f6c9562", "key": "href"}, {"hash": "85ee52885a28272b31d697c065740e5d", "key": "references"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "84813b1457b92d6ba1174abffbb83a2f", "key": "cvss"}, {"hash": "684c01ef068885a74d6d36ff2956ef78", "key": "description"}, {"hash": "90d8792ceeae00e6ab2ee51b5cc6f971", "key": "published"}, {"hash": "1ca63dae303084782be4d5429d71d193", "key": "title"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0612", "id": "CVE-2001-0612", "lastseen": "2016-09-03T03:01:02", "modified": "2008-09-05T16:24:32", "objectVersion": "1.2", "published": "2001-08-22T00:00:00", "references": ["http://xforce.iss.net/static/6547.php", "http://www.securityfocus.com/bid/2726", "http://archives.neohapsis.com/archives/bugtraq/2001-05/0158.html"], "reporter": "NVD", "scanner": [], "title": "CVE-2001-0612", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T03:01:02"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "c63cc18513a473a6e11c5811e37baa23"}, {"key": "cvelist", "hash": "f9a6fe1f906f3c829f54bfdab76b879d"}, {"key": "cvss", "hash": "84813b1457b92d6ba1174abffbb83a2f"}, {"key": "description", "hash": "684c01ef068885a74d6d36ff2956ef78"}, {"key": "href", "hash": "a927e8a9b91fb2b961fc72512f6c9562"}, {"key": "modified", "hash": "0a93b21cc67f9dd1a04a1d6373e730bf"}, {"key": "published", "hash": "90d8792ceeae00e6ab2ee51b5cc6f971"}, {"key": "references", "hash": "cc8562c2b5e2b823f68d8ef0f5d8d382"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "1ca63dae303084782be4d5429d71d193"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "aabb8757391bb6bcdc84bc38f31b4676f75cee3b59f34c9ac2b8e9bdea423895", "viewCount": 0, "enchantments": {"vulnersScore": 5.0}, "objectVersion": "1.3", "cpe": ["cpe:/a:mcafee:remote_desktop_32:2.1.2", "cpe:/a:mcafee:remote_desktop_32:3.0"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"result": {"osvdb": [{"id": "OSVDB:6288", "type": "osvdb", "title": "McAfee Remote Desktop Remote DoS", "description": "## Vulnerability Description\nMcAfee Remote Desktop contains a flaw that may allow a remote denial of service. The issue is triggered when a malicious attacker uses netcat or another utility to send large amounts of data to port 5045 to a victim, and will result in loss of availability for the platform.\n## Solution Description\nCurrently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): filter access to port 5045 on affected platforms.\n## Short Description\nMcAfee Remote Desktop contains a flaw that may allow a remote denial of service. The issue is triggered when a malicious attacker uses netcat or another utility to send large amounts of data to port 5045 to a victim, and will result in loss of availability for the platform.\n## References:\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2001-05/0158.html\nISS X-Force ID: 6547\n[CVE-2001-0612](https://vulners.com/cve/CVE-2001-0612)\nBugtraq ID: 2726\n", "published": "2001-05-16T00:00:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:6288", "cvelist": ["CVE-2001-0612"], "lastseen": "2017-04-28T13:20:01"}]}}