Wednesday, 7 August 2013

How to fix “TCP/IP Sequence Prediction Blind Reset Spoofing DoS” [duplicate]

How to fix "TCP/IP Sequence Prediction Blind Reset Spoofing DoS" [duplicate]

This question already has an answer here:
How to fix "TCP/IP Sequence Prediction Blind Reset Spoofing DoS" 1 answer
Just finished a Nessus scan and and received the alert "TCP/IP Sequence
Prediction Blind Reset Spoofing DoS" - It may be possible to send spoofed
RST packets to the remote system.
Description: The remote host might be affected by a sequence number
approximation vulnerability that may allow an attacker to send spoofed RST
packets to the remote host and close established connections. This may
cause problems for some dedicated services (BGP, a VPN over TCP, etc).
how can I fix this on 3com 4400 switch?

No comments:

Post a Comment