ID SECURITYVULNS:VULN:2341
Type securityvulns
Reporter 3APA3A
Modified 2002-10-10T00:00:00
Description
Closing client socket during SOCKS5 handshake causes server to hang with 100% CPU usage.
{"id": "SECURITYVULNS:VULN:2341", "bulletinFamily": "software", "title": "Nylon DoS", "description": "Closing client socket during SOCKS5 handshake causes server to hang with 100% CPU usage.", "published": "2002-10-10T00:00:00", "modified": "2002-10-10T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:2341", "reporter": "3APA3A", "references": ["https://vulners.com/securityvulns/securityvulns:doc:3612"], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:09:17", "edition": 1, "viewCount": 0, "enchantments": {"score": {"value": 3.1, "vector": "NONE", "modified": "2018-08-31T11:09:17", "rev": 2}, "dependencies": {"references": [{"type": "nessus", "idList": ["EULEROS_SA-2020-1498.NASL", "EULEROS_SA-2020-1457.NASL", "EULEROS_SA-2020-1496.NASL", "EULEROS_SA-2020-1477.NASL", "EULEROS_SA-2020-1491.NASL", "EULEROS_SA-2020-1494.NASL", "EULEROS_SA-2020-1483.NASL", "EULEROS_SA-2020-1489.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562311220201494", "OPENVAS:1361412562311220201489", "OPENVAS:1361412562311220201457", "OPENVAS:1361412562311220201477", "OPENVAS:1361412562311220201482", "OPENVAS:1361412562311220201400", "OPENVAS:1361412562311220201491", "OPENVAS:1361412562311220201476", "OPENVAS:1361412562311220201430", "OPENVAS:1361412562311220201473"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:3612"]}], "modified": "2018-08-31T11:09:17", "rev": 2}, "vulnersScore": 3.1}, "affectedSoftware": [{"name": "nylon", "operator": "eq", "version": "0.2"}, {"name": "nylon", "operator": "eq", "version": "0.3"}]}
{"rst": [{"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 vrbo.bw.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **20**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nWhois:\n Created: 1993-06-20 23:00:00, \n Registrar: GoDaddycom LLC, \n Registrant: Not Available From Registry.\nIOC could be a **False Positive** (Domain not resolved, but Whois records found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:4F634CEC-2341-37B8-8BF3-F5485DF57DC2", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 vrbo.bw.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 www.mac.us.bitcoin.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **48**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nDomain has DNS A records: 52[.]1.161.122\nWhois:\n Created: 2008-01-04 14:15:06, \n Registrar: unknown, \n Registrant: NameCheap Inc.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:06DAE3F1-2341-3C77-A88E-BC1BE3BAD799", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 www.mac.us.bitcoin.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 ns1.pool.gntl.co.uk** in [RST Threat Feed](https://rstcloud.net/profeed) with score **48**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nDomain has DNS A records: 83[.]151.238.34 and CNAME records: pool.gntl.co.uk,ip02.gntl.co.uk.\nWhois:\n Created: 2004-11-09 22:00:00, \n Registrar: LIVEDOMAINS, \n Registrant: unknown.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:DECC8BDA-2341-3022-96AA-1378948102B5", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 ns1.pool.gntl.co.uk", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **boxkino[.]ru** in [RST Threat Feed](https://rstcloud.net/profeed) with score **18**.\n First seen: 2020-12-06T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **malware**.\nDomain has DNS A records: 104[.]21.92.183,172.67.197.24,108.162.193.231,172.64.33.231,173.245.59.231,173.245.58.208,108.162.192.208,172.64.32.208\nWhois:\n Created: 2020-11-17 00:43:23, \n Registrar: unknown, \n Registrant: Private Person.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-06T00:00:00", "id": "RST:295C4970-2341-364B-8350-29897EBD29FC", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: boxkino.ru", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 neko.api.wallet.us.bitcoin.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **48**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nDomain has DNS A records: 194[.]14.246.72\nWhois:\n Created: 2008-01-04 14:15:06, \n Registrar: unknown, \n Registrant: NameCheap Inc.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:35FEB00E-2341-3F20-BA97-0D762C083863", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 neko.api.wallet.us.bitcoin.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **59[.]102.242.13** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **44**.\n First seen: 2021-02-17T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **shellprobe**.\nASN 131596: (First IP 59.102.128.0, Last IP 59.102.255.255).\nASN Name \"TBCOMNET\" and Organisation \"TBC\".\nASN hosts 168 domains.\nGEO IP information: City \"Hsinchu\", Country \"Taiwan\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-17T00:00:00", "id": "RST:E1C6F9BA-2341-39CF-A4B7-36B81A2EB87A", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 59.102.242.13", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **123[.]234.124.66** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **20**.\n First seen: 2020-10-17T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **generic**.\nASN 4837: (First IP 123.234.64.0, Last IP 123.235.255.255).\nASN Name \"CHINA169BACKBONE\" and Organisation \"CNCGROUP China169 Backbone\".\nASN hosts 562029 domains.\nGEO IP information: City \"Qingdao\", Country \"China\".\nIOC could be a **False Positive** (May be a Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-10-17T00:00:00", "id": "RST:D74215CB-2341-33F3-99E6-55F53BCF7A4C", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 123.234.124.66", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **123[.]245.9.147** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **10**.\n First seen: 2021-02-03T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **malware**.\nASN 4134: (First IP 123.244.0.0, Last IP 123.246.254.255).\nASN Name \"CHINANETBACKBONE\" and Organisation \"No31Jinrong Street\".\nASN hosts 1235891 domains.\nGEO IP information: City \"Shenyang\", Country \"China\".\nIOC could be a **False Positive** (Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-03T00:00:00", "id": "RST:71A433F2-2341-3E27-9947-4F247AC7F8E4", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 123.245.9.147", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **149[.]129.59.254** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **10**.\n First seen: 2021-01-05T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **shellprobe**.\nASN 45102: (First IP 149.129.24.0, Last IP 149.129.212.188).\nASN Name \"CNNICALIBABAUSNETAP\" and Organisation \"Alibaba US Technology Co Ltd\".\nASN hosts 8339206 domains.\nGEO IP information: City \"Dongguan\", Country \"China\".\nIOC could be a **False Positive** (Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-01-05T00:00:00", "id": "RST:27B97B13-2341-3CE3-BEBD-59E5C2C59126", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 149.129.59.254", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-22T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **200[.]111.182.6** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **1**.\n First seen: 2019-11-06T03:00:00, Last seen: 2021-02-22T03:00:00.\n IOC tags: **generic**.\nASN 6471: (First IP 200.111.172.0, Last IP 200.111.189.255).\nASN Name \"ENTEL\" and Organisation \"CHILE SA\".\nASN hosts 4872 domains.\nGEO IP information: City \"Negrete\", Country \"Chile\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-11-06T00:00:00", "id": "RST:D9B7BA54-2341-346E-BD92-A8EF5C0DEB82", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 200.111.182.6", "type": "rst", "cvss": {}}]}