Network Vulnerability Assessment Report
27.05.2005
Sorted by host names

Session name: D-Link-DGL-4100Start Time:27.05.2005 16:12:29
Finish Time:27.05.2005 16:22:53
Elapsed:0 day(s) 00:10:24
Total records generated:5
high severity:0
Medium severity:1
informational:4


10.0.0.86

ServiceSeverityDescription
www (80/tcp)
Info
Port is open
general/tcp
Medium

The remote host does not discard TCP SYN packets which
have the FIN flag set.

Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.

See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html
http://www.kb.cert.org/vuls/id/464113

Solution : Contact your vendor for a patch
Risk factor : Medium
BID : 7487
www (80/tcp)
Info
The remote web server type is :

Ubicom/1.1


general/udp
Info
For your information, here is the traceroute to 10.0.0.86 :
10.0.0.59
10.0.0.86

www (80/tcp)
Info
A web server is running on this port