![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.11704 |
Category: | Misc. |
Title: | icmp leak |
Summary: | NOSUMMARY |
Description: | Description: The remote host is vulnerable to an 'icmp leak' of potentially confidential data. That is, when the host generates an ICMP error packet other than 'destination unreachable', the error packet is supposed to only contain the original message or a portion of the original message. Due to a bug in the remote TCP/IP stack, these ICMP error messages will also contain fragments of the content of the remote kernel memory. An attacker may use this flaw to remotely sniff what is going into the host's memory, especially network packets that it sees, and obtain useful information such as POP passwords, HTTP authentication fields, and so on. Solution : Contact your vendor for a fix. If the remote host is running Linux 2.0, upgrade to Linux 2.0.40. See also : http://www.cartel-securite.fr/pbiondi/adv/CARTSA-20030314-icmpleak http://www.kb.cert.org/vuls/id/471084 Risk factor : High |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0418 Bugtraq: 20030609 Linux 2.0 remote info leak from too big icmp citation (Google Search) http://marc.info/?l=bugtraq&m=105519179005065&w=2 CERT/CC vulnerability note: VU#471084 http://www.kb.cert.org/vuls/id/471084 http://www.cartel-securite.fr/pbiondi/adv/CARTSA-20030314-icmpleak.txt |
Copyright | This script is Copyright (C) 2003 Tenable Network Security |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |