Network Vulnerability Assessment Report
27.06.2004
Sorted by host names

Session name: Asus wl500gStart Time:27.06.2004 22:14:02
Finish Time:27.06.2004 22:58:42
Elapsed:0 day(s) 00:44:39
Total records generated:5
high severity:0
low severity:3
informational:2


Summary of scanned hosts

HostHolesWarningsOpen portsState
20.0.0.1032Finished


20.0.0.1

ServiceSeverityDescription
unknown (515/tcp)
Info
Port is open
www (80/tcp)
Info
Port is open
general/tcp
Low
Nessus was not able to reliably identify the remote operating system. It might be:
Netilla Service Platform 4.0
The fingerprint differs from these known signatures on 5 points.
If you know what operating system this host is running, please send this signature to
os-signatures@nessus.org :
:1:1:0:64:0:64:1:0:64:1:0:64:1:>64:64:0:1:1:1:1:1:1:1:0:64:4344:MSTNW:0:1:1
general/tcp
Low

The remote host does not discard TCP SYN packets which
have the FIN flag set.

Depending on the kind of firewall you are using, an
attacker may use this flaw to bypass its rules.

See also : http://archives.neohapsis.com/archives/bugtraq/2002-10/0266.html
http://www.kb.cert.org/vuls/id/464113

Solution : Contact your vendor for a patch
Risk factor : Medium
BID : 7487
general/udp
Low
For your information, here is the traceroute to 20.0.0.1 :
20.0.0.2
20.0.0.1