To Nessus List serve members:

 

I just ran a new scan of a network with Nessus 3.06.   I had scanned
that same network with an earlier version approximately 6 months ago.
The earlier scan showed very few holes but this scan showed many more
with the most prevalent being the following:

 

It was possible to crash the remote host by sending a specially
malformed TCP/IP packet with invalid TCP options. Only the version
2.6 of the Linux Kernel is known to be affected by this problem.

 

This scan was of a Microsoft only network (Windows server 2003, XP and
2000 workstations, a Cisco Router, and HP switch).  In this network what
is generating this hole?  Any help you can provide would be greatly
appreciated.

 

Thank you very much.

 

Best regards,

 

Bruce

 

Bruce Billingham

President

 

Trusted Information Technology Services

www.ms-group.com <http://www.ms-group.com/> 

[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> 

6 Washington Street

Beverly, MA   01915

Tel (978) 921-0617

Tel Auto Attendant (978) 524-7700 ext 12

Fax (978) 922-8885

 

The information contained in this electronic message and any attachments
to this message are intended for the exclusive use of the addressee(s)
and may contain confidential or privileged information.  If you are not
the intended recipient, please notify Micro Support Group, Inc. at
either (978) 921-0617 or [EMAIL PROTECTED] and destroy all copies of
this message and any attachments.

 

 

<<image001.jpg>>

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to