![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.10271 |
Category: | Denial of Service |
Title: | stream.c |
Summary: | NOSUMMARY |
Description: | Description: It seems it was possible to make the remote server crash using the 'stream.c' attack. An attacker may use this flaw to shut down this server, thus preventing your network from working properly. Solution : contact your operating system vendor for a patch. Workaround : if you use IP filter, then add these rules : block in quick proto tcp from any to any head 100 pass in quick proto tcp from any to any flags S keep state group 100 pass in all Reference : http://online.securityfocus.com/archive/1/42729 Reference : http://online.securityfocus.com/archive/1/42723 Risk factor : Medium CVSS Score: 2.1 |
Cross-Ref: |
BugTraq ID: 549 Common Vulnerability Exposure (CVE) ID: CVE-1999-0770 http://www.securityfocus.com/bid/549 Bugtraq: 19990729 Simple DOS attack on FW-1 (Google Search) CheckPoint Alert: ACK DOS ATTACK http://www.osvdb.org/1027 |
Copyright | This script is Copyright (C) 2000 Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |