Network Vulnerability Assessment Report
27.06.2004
Sorted by host names

Session name: Asus wl500gStart Time:27.06.2004 21:25:48
Finish Time:27.06.2004 22:10:53
Elapsed:0 day(s) 00:45:04
Total records generated:1
high severity:1
low severity:0
informational:0


Summary of scanned hosts

HostHolesWarningsOpen portsState
20.0.0.1100Finished


20.0.0.1

ServiceSeverityDescription
general/udp
High

It is possible to by-pass the rules of the remote firewall
by sending UDP packets with a source port equal to 53.

An attacker may use this flaw to inject UDP packets to the remote
hosts, in spite of the presence of a firewall.

Solution : Review your firewall rules policy
Risk Factor : High
BID : 7436