ID CVE-2006-0362 Type cve Reporter cve@mitre.org Modified 2017-07-20T01:29:00
Description
TippingPoint Intrusion Prevention System (IPS) TOS before 2.1.4.6324, and TOS 2.2.x before 2.2.1.6506, allow remote attackers to cause a denial of service (CPU consumption) via an unknown vector, probably involving an HTTP request with a negative number in the Content-Length header.
{"osvdb": [{"lastseen": "2017-04-28T13:20:19", "bulletinFamily": "software", "description": "## Vulnerability Description\nTippingPoint contains a flaw that may allow a remote denial of service. The issue is triggered when an HTTP request with a negative Content-Length is observed, and will result in loss of availability for the platform.\n## Solution Description\nUpgrade to TOS version 2.1.4.6324, 2.2.1.6506 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nTippingPoint contains a flaw that may allow a remote denial of service. The issue is triggered when an HTTP request with a negative Content-Length is observed, and will result in loss of availability for the platform.\n## References:\nVendor URL: http://www.tippingpoint.com/products_ips.html\nSecurity Tracker: 1015511\n[Secunia Advisory ID:18515](https://secuniaresearch.flexerasoftware.com/advisories/18515/)\nOther Advisory URL: http://isc.sans.org/diary.php?storyid=1042\nNews Article: http://www.eweek.com/article2/0,1895,1912048,00.asp\n[CVE-2006-0362](https://vulners.com/cve/CVE-2006-0362)\nBugtraq ID: 16299\n", "modified": "2006-01-17T22:45:56", "published": "2006-01-17T22:45:56", "href": "https://vulners.com/osvdb/OSVDB:22504", "id": "OSVDB:22504", "type": "osvdb", "title": "3Com TippingPoint IPS Malformed HTTP Request DoS", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}]}