Date: Tue, 11 Dec 2001 14:23:49 -0600 From: "Darryl Hoar" <darryl@osborne-ind.com> To: <freebsd-questions@freebsd.org> Subject: Security problems Message-ID: <001c01c18281$bf03bd90$0701a8c0@darryl>
next in thread | raw e-mail | index | archive | help
Greeting, I had my ISP run a scan on my firewall/router. They used the Nessus software to test it. It found the following problems: . Warning found on port general/tcp The remote host uses non-random IP IDs, that is, it is possible to predict the next value of the ip_id field of the ip packets sent by this host. An attacker may use this feature to determine if the remote host sent a packet in reply to another request. This may be used for portscanning and other things. . Nmap found that this host is running Apple AirPort Wireless Hub Base Station v3.x . Vulnerability found on port general/udp : It was possible to crash the remote server using the linux 'zero fragment' bug. A cracker may use this flaw to prevent your network from working properly. Risk factor : High Do I have to worry about these? How do I fix them? Any help greatly appreciated. -Darryl To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?001c01c18281$bf03bd90$0701a8c0>