Home page logo

pen-test logo Penetration Testing mailing list archives

loose source routed IP packets
From: <christophstrizik () yahoo com au>
Date: 25 Feb 2004 07:21:55 -0000

Dear fellows

During one of my pen-tests I encountered the following vulnerability:

The remote host accepts loose source routed IP packets.
The feature was designed for testing purpose.
An attacker may use it to circumvent poorly designed IP filtering
and exploit another flaw. However, it is not dangerous by itself.

Solution : drop source routed packets on this host or on other ingress
routers or firewalls.

Risk factor : Low
Nessus ID : 11834
I think there is some sort of filtering device between the source and destination host. I also suspect that the 
filtering device just drops the packets and the nessus plug-in assumes the packet could be successfully delivered. 
Anybody any hints on that one?

Kind regards,


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]