Hi, have you read the page mentioned in the plugin: http://www.securiteam.com/securitynews/5FP0N1P9PI.html ?
On Thu, 2004-06-10 at 16:44 -0600, Harkaran Bedi wrote: > On a recent Nessus scan - received the following as a security hole: > > "It is possible to by-pass the rules of the remote firewall > by sending UDP packets with a source port equal to 53." > > The device in question is not a firewall, its actually a load balancer. > While its possible it may be a false positive, I'd like to confirm this > all the same, and understand its impact. I ran nmap scans with the > following options: > > nmap -g 53 -sU <target> > > Is there anyway to confirm this vulnerability? I'm not sure how an > attacker could take advantage of this potential vulnerability? > > Insight appreciated, > Thanks. > > _______________________________________________ > Nessus mailing list > [EMAIL PROTECTED] > http://mail.nessus.org/mailman/listinfo/nessus -- </nk>
signature.asc
Description: This is a digitally signed message part
_______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
