Описание
The DNS module in Arkoon FAST360 UTM appliances 3.0 up to 3.0/29, 3.1 through 3.3, and 4.0 allows remote attackers to cause a denial of service (reboot) via a malformed DNS message, as demonstrated by the PROTOS DNS testing suite.
Ссылки
- Patch
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:arkoon:fast360:3.0:*:*:*:*:*:*:*
cpe:2.3:a:arkoon:fast360:3.0_29:*:*:*:*:*:*:*
cpe:2.3:a:arkoon:fast360:3.1:*:*:*:*:*:*:*
cpe:2.3:a:arkoon:fast360:3.2:*:*:*:*:*:*:*
cpe:2.3:a:arkoon:fast360:3.3:*:*:*:*:*:*:*
cpe:2.3:a:arkoon:fast360:4.0_1:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00882
Низкий
7.8 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
The DNS module in Arkoon FAST360 UTM appliances 3.0 up to 3.0/29, 3.1 through 3.3, and 4.0 allows remote attackers to cause a denial of service (reboot) via a malformed DNS message, as demonstrated by the PROTOS DNS testing suite.
EPSS
Процентиль: 75%
0.00882
Низкий
7.8 High
CVSS2
Дефекты
NVD-CWE-Other