This script is Copyright (C) 2003-2017 Tenable Network Security, Inc.
The remote host responds to TCP packets that are coming from a
multicast IP address.
Nessus has detected that the remote host responds to TCP packets
that are coming from a multicast IP address. An attacker can exploit
this to conduct a 'spank' denial of service attack, resulting in the
host being shut down or network traffic reaching saturation. Also,
this vulnerability can be used by an attacker to conduct stealth port
scans against the host.
Contact your operating system vendor for a patch. Alternatively,
filter out multicast IP addresses (188.8.131.52/4).
Risk factor :
Medium / CVSS Base Score : 6.1
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now