First published: Sun Jan 22 2006(Updated: )
TippingPoint Intrusion Prevention System (IPS) TOS before 2.1.4.6324, and TOS 2.2.x before 2.2.1.6506, allow remote attackers to cause a denial of service (CPU consumption) via an unknown vector, probably involving an HTTP request with a negative number in the Content-Length header.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
3com Tippingpoint Ips Tos | =2.2.0.6504 | |
3com Tippingpoint Ips Tos | <=2.1.3.6323 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0362 is classified as a denial of service vulnerability that can lead to significant CPU consumption.
To resolve CVE-2006-0362, upgrade to TippingPoint IPS TOS version 2.1.4.6324 or 2.2.1.6506 or later.
CVE-2006-0362 affects TippingPoint IPS TOS versions before 2.1.4.6324 and all versions of 2.2.x prior to 2.2.1.6506.
Yes, CVE-2006-0362 can be exploited remotely by sending specially crafted HTTP requests.
Successful exploitation of CVE-2006-0362 can result in a denial of service, affecting the system's performance and availability.