To Nessus List serve members:
I just ran a new scan of a network with Nessus 3.06. I had scanned that same network with an earlier version approximately 6 months ago. The earlier scan showed very few holes but this scan showed many more with the most prevalent being the following: It was possible to crash the remote host by sending a specially malformed TCP/IP packet with invalid TCP options. Only the version 2.6 of the Linux Kernel is known to be affected by this problem. This scan was of a Microsoft only network (Windows server 2003, XP and 2000 workstations, a Cisco Router, and HP switch). In this network what is generating this hole? Any help you can provide would be greatly appreciated. Thank you very much. Best regards, Bruce Bruce Billingham President Trusted Information Technology Services www.ms-group.com <http://www.ms-group.com/> [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> 6 Washington Street Beverly, MA 01915 Tel (978) 921-0617 Tel Auto Attendant (978) 524-7700 ext 12 Fax (978) 922-8885 The information contained in this electronic message and any attachments to this message are intended for the exclusive use of the addressee(s) and may contain confidential or privileged information. If you are not the intended recipient, please notify Micro Support Group, Inc. at either (978) 921-0617 or [EMAIL PROTECTED] and destroy all copies of this message and any attachments.
<<image001.jpg>>
_______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
