TCP/IP Sequence Prediction Blind Reset Spoofing DoS

This script is (C) 2004-2017 Tenable Network Security, Inc.

Synopsis :

It was possible to send spoofed RST packets to the remote system.

Description :

The remote host is affected by a sequence number approximation
vulnerability that allows an attacker to send spoofed RST packets to
the remote host and close established connections. This may cause
problems for some dedicated services (BGP, a VPN over TCP, etc).

See also :

Solution :

Contact the vendor for a patch or mitigation advice.

Risk factor :

Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.5
Public Exploit Available : true

Family: Denial of Service

Nessus Plugin ID: 12213 ()

Bugtraq ID: 10183

CVE ID: CVE-2004-0230

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now