Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.11367
Categoría:Useless services
Título:Check for discard Service (TCP)
Resumen:The remote host is running a 'discard' service. This service; typically sets up a listening socket and will ignore all the data which it receives.;; This service is unused these days, so it is advised that you disable it.
Descripción:Summary:
The remote host is running a 'discard' service. This service
typically sets up a listening socket and will ignore all the data which it receives.

This service is unused these days, so it is advised that you disable it.

Solution:
- Under Unix systems, comment out the 'discard' line in
/etc/inetd.conf and restart the inetd process

- Under Windows systems, set the following registry key to 0:

HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpDiscard

Then launch cmd.exe and type:

net stop simptcp

net start simptcp

To restart the service.

Notes:

Some firewall devices are known to discard packets on the checked port 9/tcp or mimic such a
service via other means. Scanning through a firewall should be generally avoided (Please see
references).

If the target was scanned through a firewall and it was determined / has been verified that no
such service is running on the target please either:

- create an override for this result

- configure the firewall in a way that port 9/tcp is not reported as being open during the port
scanning phase / it is not allowed to open a TCP connection to port 9/tcp on the target

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-1999-0636
https://www.cve.org/CVERecord?id=CVE-1999-0636
CopyrightCopyright (C) 2020 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.