Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
STUN Server Detection
Detailed Explanation for this Vulnerability Assessment
A VPN server is listening on the remote port.
The remote host is running a STUN (Simple Traversal of User Datagram
Protocol - RFC 3489) server.
Simple Traversal of User Datagram Protocol (UDP) Through Network
Address Translators (NATs) (STUN) is a lightweight protocol that
permits applications to discover the existence and types of NATs and
firewalls between them and the public Internet. It also provides the
ability for applications to acertain the public Internet Protocol
(IP) addresses allocated to them by the NAT. STUN works with many
existing NATs, and does not require any special behavior from them.
As a result, it permits a wide variety of applications to work through
existing NAT infrastructure.
Make sure the use of this software is done in accordance with your corporate
If this service is not needed, disable it or filter incoming traffic
to this port.
Network Security Threat Level:
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Noam Rathaus
No Discussions have been posted on this vulnerability.