Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.80091
Category:General
Title:TCP timestamps
Summary:The remote host implements TCP timestamps and therefore allows to compute; the uptime.
Description:Summary:
The remote host implements TCP timestamps and therefore allows to compute
the uptime.

Vulnerability Insight:
The remote host implements TCP timestamps, as defined by RFC1323/RFC7323.

Vulnerability Impact:
A side effect of this feature is that the uptime of the remote
host can sometimes be computed.

Affected Software/OS:
TCP implementations that implement RFC1323/RFC7323.

Solution:
To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to
/etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the
Timestamp options when initiating TCP connections, but use them if the TCP peer
that is initiating communication includes them in their synchronize (SYN) segment.

See the references for more information.

CVSS Score:
2.6

CVSS Vector:
AV:N/AC:H/Au:N/C:P/I:N/A:N

CopyrightCopyright (C) 2008 Michel Arboi

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.