Penetration Testing mailing list archives
loose source routed IP packets
From: <christophstrizik () yahoo com au>
Date: 25 Feb 2004 07:21:55 -0000
Dear fellows During one of my pen-tests I encountered the following vulnerability: The remote host accepts loose source routed IP packets. The feature was designed for testing purpose. An attacker may use it to circumvent poorly designed IP filtering and exploit another flaw. However, it is not dangerous by itself. Solution : drop source routed packets on this host or on other ingress routers or firewalls. Risk factor : Low Nessus ID : 11834 \\\\\\\\\\\\\\\\\\\\\\\\\\\\ I think there is some sort of filtering device between the source and destination host. I also suspect that the filtering device just drops the packets and the nessus plug-in assumes the packet could be successfully delivered. Anybody any hints on that one? Kind regards, Christoph --------------------------------------------------------------------------- ----------------------------------------------------------------------------
Current thread:
- loose source routed IP packets christophstrizik (Feb 25)
- <Possible follow-ups>
- Re: loose source routed IP packets Don Parker (Feb 25)
- Re: loose source routed IP packets Chris . McNab (Feb 26)