Hi,
have you read the page mentioned in the plugin:
http://www.securiteam.com/securitynews/5FP0N1P9PI.html ?


On Thu, 2004-06-10 at 16:44 -0600, Harkaran Bedi wrote:
> On a recent Nessus scan - received the following as a security hole:
> 
> "It is possible to by-pass the rules of the remote firewall
> by sending UDP packets with a source port equal to 53."
> 
> The device in question is not a firewall, its actually a load balancer.
> While its possible it may be a false positive, I'd like to confirm this
> all the same, and understand its impact. I ran nmap scans with the
> following options:
> 
> nmap -g 53 -sU <target>
> 
> Is there anyway to confirm this vulnerability? I'm not sure how an
> attacker could take advantage of this potential vulnerability?
> 
> Insight appreciated,
> Thanks.
> 
> _______________________________________________
> Nessus mailing list
> [EMAIL PROTECTED]
> http://mail.nessus.org/mailman/listinfo/nessus
-- 
</nk>

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to