Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Firewalls >> icmp timestamp request


Vulnerability Assessment Details

icmp timestamp request

Vulnerability Assessment Summary
Performs an ICMP timestamp request

Detailed Explanation for this Vulnerability Assessment

Summary :

It is possible to acertain the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This permits a possible hacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Network Security Threat Level:

None / CVSS Base Score : 0
(AV:R/AC:L/Au:NR/C:N/A:N/I:N/B:N)

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison

Cables, Connectors

1975 Build a Motorola 6800 Microcomputer MEK6800 w/ Schematics Altair 680 SWTPC
$32.0
1975 Build a Motorola 6800 Microcomputer MEK6800 w/ Schematics Altair 680 SWTPC picture1979 Microcomputer Projects Altair 8800 Scelbi 8080 KIM-1 Intel 8008 COSMAC Elf
$29.99
1979 Microcomputer Projects Altair 8800 Scelbi 8080 KIM-1 Intel 8008 COSMAC Elf picture1979 BYTE Electronic Music MITS Altair Intel 8080 KIM-1 Cromemco Circuit Cellar
$36.0
1979 BYTE Electronic Music MITS Altair Intel 8080 KIM-1 Cromemco Circuit Cellar pictureMITS ALTAIR 12K EXTENDED BASIC PAPER PUNCH TAPE EXCELLENT
$159.95
MITS ALTAIR 12K EXTENDED BASIC PAPER PUNCH TAPE EXCELLENT picture


Discussions

No Discussions have been posted on this vulnerability.