Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Firewalls >> icmp timestamp request


Vulnerability Assessment Details

icmp timestamp request

Vulnerability Assessment Summary
Performs an ICMP timestamp request

Detailed Explanation for this Vulnerability Assessment

Summary :

It is possible to acertain the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This permits a possible hacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Network Security Threat Level:

None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

Dell PowerEdge R510 2x X5650 2.66GHz 6 Core 32GB 12x 2TB 7.2K SATA PERC H700
$1570.0
Dell PowerEdge R510 2x X5650 2.66GHz 6 Core 32GB 12x 2TB 7.2K SATA PERC H700 pictureHP ProLiant DL380 G9 Server 2x2.40Ghz E5-2660v3 10C 96GB 3x160GB SSD 21x1TB SAS
$5590.2
HP ProLiant DL380 G9 Server 2x2.40Ghz E5-2660v3 10C 96GB 3x160GB SSD 21x1TB SAS pictureDELL POWEREDGE R730XD SERVER 24 BAY TWO E5-2637V3 3.5GHZ 24GB 3TB SAS 8 X 200GB
$6469.0
DELL POWEREDGE R730XD SERVER 24 BAY TWO E5-2637V3 3.5GHZ 24GB 3TB SAS 8 X 200GB pictureDELL POWEREDGE R630 8 BAY 2 X E5-2603V4 1.7GHZ 256GB 5 X 600GB SSD H730
$5359.0
DELL POWEREDGE R630 8 BAY 2 X E5-2603V4 1.7GHZ 256GB 5 X 600GB SSD H730 picture


Discussions

No Discussions have been posted on this vulnerability.