How to Buy
This script is Copyright (C) 2003-2017 Tenable Network Security, Inc.
The remote host responds to TCP packets that are coming from a
multicast IP address.
Nessus has detected that the remote host responds to TCP packets
that are coming from a multicast IP address. An attacker can exploit
this to conduct a 'spank' denial of service attack, resulting in the
host being shut down or network traffic reaching saturation. Also,
this vulnerability can be used by an attacker to conduct stealth port
scans against the host.
Contact your operating system vendor for a patch. Alternatively,
filter out multicast IP addresses (126.96.36.199/4).
Risk factor :
Medium / CVSS Base Score : 6.1
Family: Denial of Service
Nessus Plugin ID: 11901 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.