ID CVE-1999-0523
Summary ICMP echo (ping) is allowed from arbitrary hosts.
References
Vulnerable Configurations
CVSS
Base: 0.0 (as of 17-08-2022 - 10:15)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:N
statements via4
contributor Joshua Bressers
lastmodified 2007-09-11
organization Red Hat
statement Red Hat Enterprise Linux by default does respond to ICMP echo requests, although it’s likely that in a production environment those would be filtered by some firewall on entry to your network. However you can happily block ICMP ping responses using iptables if you so wish, but note that there is no known vulnerability in allowing them. For more details, please see: http://kbase.redhat.com/faq/FAQ_43_4304.shtm
Last major update 17-08-2022 - 10:15
Published 01-01-1999 - 05:00
Last modified 17-08-2022 - 10:15
Back to Top