![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.11057 |
Category: | Firewalls |
Title: | Raptor/Novell Weak ISN |
Summary: | NOSUMMARY |
Description: | Description: The remote host seems to generate Initial Sequence Numbers (ISN) in a weak manner which seems to solely depend on the source and dest port of the TCP packets. An attacker may exploit this flaw to establish spoofed connections to the remote host. The Raptor Firewall and Novell Netware are known to be vulnerable to this flaw, although other network devices may be vulnerable as well. Solution : If you are using a Raptor Firewall, see http://www.symantec.com/techsupp/bulletin/archive/firewall/082002firewall.html Otherwise, contact your vendor for a patch. Reference : http://online.securityfocus.com/archive/1/285729 Risk factor : High |
Cross-Ref: |
BugTraq ID: 5387 BugTraq ID: 8652 Common Vulnerability Exposure (CVE) ID: CVE-2002-1463 http://www.securityfocus.com/bid/5387 Bugtraq: 20020802 Security Advisory: Raptor Firewall Weak ISN Vulnerability (Google Search) http://archives.neohapsis.com/archives/bugtraq/2002-07/0492.html http://www.osvdb.org/855 XForce ISS Database: symantec-tcp-seq-predict(12836) https://exchange.xforce.ibmcloud.com/vulnerabilities/12836 |
Copyright | This script is Copyright (C) 2002 Renaud Deraison |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |