System Responds to SYN+FIN TCP Packets
This device responded to a TCP packet with both the SYN and FIN
bits set. Such packets do not occur in typical network traffic, but can
be used by attackers to bypass the security rules configured in nonstateful
firewalls and establish connections with protected hosts.
CVSSv2: AV:N/AC:L/Au:N/C:N/I:N/A:N(0.00)
Reference: US-CERT Vulnerability Note VU#464113 - TCP/IP implementations handle unusual flag combinations inconsistently
Service: apache:http_server (astaro 8.102)
Service: https (ubuntu server behind 7.509)
Thanks,
Barry
This thread was automatically locked due to age.