ID |
CVE-1999-0523
|
Summary |
ICMP echo (ping) is allowed from arbitrary hosts. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 0.0 (as of 17-08-2022 - 10:15) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
NONE |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:N
|
statements
via4
|
contributor | Joshua Bressers | lastmodified | 2007-09-11 | organization | Red Hat | statement | Red Hat Enterprise Linux by default does respond to ICMP echo requests, although it’s likely that in a production environment those would be filtered by some firewall on entry to your network. However you can happily block ICMP ping responses using iptables if you so wish, but note that there is no known vulnerability in allowing them.
For more details, please see:
http://kbase.redhat.com/faq/FAQ_43_4304.shtm |
|
Last major update |
17-08-2022 - 10:15 |
Published |
01-01-1999 - 05:00 |
Last modified |
17-08-2022 - 10:15 |