![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.11057 |
Categoría: | Firewalls |
Título: | Raptor/Novell Weak ISN |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host seems to generate Initial Sequence Numbers (ISN) in a weak manner which seems to solely depend on the source and dest port of the TCP packets. An attacker may exploit this flaw to establish spoofed connections to the remote host. The Raptor Firewall and Novell Netware are known to be vulnerable to this flaw, although other network devices may be vulnerable as well. Solution : If you are using a Raptor Firewall, see http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html Otherwise, contact your vendor for a patch. Reference : http://online.securityfocus.com/archive/1/285729 Risk factor : High |
Referencia Cruzada: |
BugTraq ID: 5387 BugTraq ID: 8652 Common Vulnerability Exposure (CVE) ID: CVE-2002-1463 http://www.securityfocus.com/bid/5387 Bugtraq: 20020802 Security Advisory: Raptor Firewall Weak ISN Vulnerability (Google Search) http://archives.neohapsis.com/archives/bugtraq/2002-07/0492.html http://www.osvdb.org/855 XForce ISS Database: symantec-tcp-seq-predict(12836) https://exchange.xforce.ibmcloud.com/vulnerabilities/12836 |
Copyright | This script is Copyright (C) 2002 Renaud Deraison |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |