![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.80091 |
Category: | General |
Title: | TCP Timestamps Information Disclosure |
Summary: | The remote host implements TCP timestamps and therefore allows; to compute the uptime. |
Description: | Summary: The remote host implements TCP timestamps and therefore allows to compute the uptime. Vulnerability Insight: The remote host implements TCP timestamps, as defined by RFC1323/RFC7323. Vulnerability Impact: A side effect of this feature is that the uptime of the remote host can sometimes be computed. Affected Software/OS: TCP implementations that implement RFC1323/RFC7323. Solution: To disable TCP timestamps on linux add the line 'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at runtime. To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled' Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled. The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when initiating TCP connections, but use them if the TCP peer that is initiating communication includes them in their synchronize (SYN) segment. See the references for more information. CVSS Score: 2.6 CVSS Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N |
Copyright | Copyright (C) 2008 Michel Arboi |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |