How to solve TCP sequence number approximation vulnerability issue
Hi,
we use a software tool (rapid7 nexporse) to scan the web server in our linux board, kernel 2.6.39.4. It says we have TCP sequence number approximation vulnerability issue. i did search but found nothing so far. So how to resolve this please ? Many thanks ! |
well you don't say what distro, but Redhat are happy to NOT fix this... https://access.redhat.com/security/cve/CVE-2004-0230 and Debian also don't care - https://security-tracker.debian.org/.../CVE-2004-0230
|
interesting, this is embedded system, we customize root file system ourselves.
Quote:
|
well if you want to fix an insignificant issue, the kernel source is there waiting for you.
|
All times are GMT -5. The time now is 03:43 AM. |