Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Home >> Browse Vulnerability Assessment Database >> Firewalls >> Remote host replies to SYN+FIN
Vulnerability Assessment Details
Remote host replies to SYN+FIN
Sends a SYN+FIN packet and expects a SYN+ACK
Detailed Explanation for this Vulnerability Assessment
It may be possible to bypass firewall rules
The remote host does not discard TCP SYN packets which have
the FIN flag set.
Depending on the kind of firewall you are using, a possible hacker
may use this flaw to bypass its rules.
See also :
Contact your vendor for a patch
Network Security Threat Level:
None / CVSS Base Score : 0
Networks Security ID: 7487
Vulnerability Assessment Copyright: This script is Copyright (C) 2003 Tenable Network Security
Cisco WS-C3750G-48TS-S 48 Port Gigabit Switch 1 YEAR WARRANTY SAME DAY SHIPPING
Cisco Catalyst WS-C3750G-48PS-S 48 Port PoE Gigabit Ethernet Switch 4x SFP
Cisco Catalyst 2960-48PST-L V04 Switch
Cisco ME 3400E Series ME-3400E + Power Cord
Cisco Catalyst 3560-CG Series PoE Switch - Powers On - Untested
Cisco Catalyst 3850 WS-C3850-24P-L 24-PoE+ Port Gigabit Ethernet Switch
Cisco Catalyst WS-C3850-48PW-S V02 Switch W/C3850-NM-4-10G, Excellent Unit
Cisco Catalyst 2960 48 Port Gigabit Ethernet Switch WS-C2960+48TC-L V02 V01
Cisco WS-C3750G-24PS-S Catalyst 3750G 24-Port Gigabit Ethernet Network Switch
BRAND NEW Cisco 892FSP C892FSP-K9 Gigabit Ethernet Security Router
No Discussions have been posted on this vulnerability.