Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Misc. >> TCP Chorusing


Vulnerability Assessment Details

TCP Chorusing

Vulnerability Assessment Summary
Counts the number of ACKs to a SYN

Detailed Explanation for this Vulnerability Assessment

Microsoft Windows 95 and 98 clients have the ability
to bind multiple TCP/IP stacks on the same MAC address,
simply by having the protocol added more than once
in the Network Control panel.

The remote host has several TCP/IP stacks with the
same IP bound on the same MAC address. As a result,
it will reply several times to the same packets,
such as by sending multiple ACK to a single SYN,
creating noise on your network. If several hosts
behave the same way, then your network will be brought
down.

Solution : Remove all the IP stacks except one in the remote
host.
Network Security Threat Level: Medium

Networks Security ID: 225

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

Avid VR-RTR320X 10-Bay Ultra320 SCSI Hard Drive Array Enclosure Video Raid
$79.0
Avid VR-RTR320X 10-Bay Ultra320 SCSI Hard Drive Array Enclosure Video Raid pictureHP 412205-001 DL360 G5 SMART ARRAY E200i SAS RAID
$38.17
HP 412205-001 DL360 G5 SMART ARRAY E200i SAS RAID pictureAPPLE MAC MINI 2.6Ghz QUAD CORE i7 4TB SSD (DUAL 2TB RAID-0) 4000GB 16GB RAM
$2799.94
APPLE MAC MINI 2.6Ghz QUAD CORE i7 4TB SSD (DUAL 2TB RAID-0) 4000GB 16GB RAM picture D668J New Battery for Dell Raid Controller PowerVault BAT-2S1 MD 3200i/3220i
$42.0
 D668J  New Battery for Dell Raid Controller PowerVault  BAT-2S1 MD 3200i/3220i  picture


Discussions

No Discussions have been posted on this vulnerability.