FreeBSD : SA-04:04.tcp

medium Nessus Plugin ID 12589

Synopsis

The remote device is missing a vendor-supplied security patch

Description

The remote host is running a version of the FreeBSD kernel which may be vulnerable to a remote denial of service attack when processing many out of sequence TCP packets.

Solution

http://www.vuxml.org/freebsd/e289f7fd-88ac-11d8-90d1-0020ed76ef5a.html

Plugin Details

Severity: Medium

ID: 12589

File Name: freebsd_outofseq_tcp_packets_dos.nasl

Version: Revision: 1.13

Published: 7/6/2004

Updated: 11/3/2011

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

Required KB Items: Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2004-0171

BID: 9792