Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.104010
Kategorie:Nmap NSE net
Titel:Nmap NSE net: path-mtu
Zusammenfassung:Performs simple Path MTU Discovery to target hosts.;;TCP or UDP packets are sent to the host with the DF (don't fragment) bit set and with varying;amounts of data. If an ICMP Fragmentation Needed is received, or no reply is received after;retransmissions, the amount of data is lowered and another packet is sent. This continues until;(assuming no errors occur) a reply from the final host is received, indicating the packet reached;the host without being fragmented.;;Not all MTUs are attempted so as to not expend too much time or network resources. Currently the;relatively short list of MTUs to try contains the plateau values from Table 7-1 in RFC 1191, 'Path;MTU Discovery'. Using these values significantly cuts down the MTU search space. On top of that,;this list is rarely traversed in whole because: * the MTU of the outgoing interface is used as a;starting point, and * we can jump down the list when an intermediate router sending a;'can't fragment' message includes its next hop MTU (as described in RFC 1191 and required by;RFC 1812)
Beschreibung:Summary:
Performs simple Path MTU Discovery to target hosts.

TCP or UDP packets are sent to the host with the DF (don't fragment) bit set and with varying
amounts of data. If an ICMP Fragmentation Needed is received, or no reply is received after
retransmissions, the amount of data is lowered and another packet is sent. This continues until
(assuming no errors occur) a reply from the final host is received, indicating the packet reached
the host without being fragmented.

Not all MTUs are attempted so as to not expend too much time or network resources. Currently the
relatively short list of MTUs to try contains the plateau values from Table 7-1 in RFC 1191, 'Path
MTU Discovery'. Using these values significantly cuts down the MTU search space. On top of that,
this list is rarely traversed in whole because: * the MTU of the outgoing interface is used as a
starting point, and * we can jump down the list when an intermediate router sending a
'can't fragment' message includes its next hop MTU (as described in RFC 1191 and required by
RFC 1812)

CVSS Score:
0.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:N

CopyrightCopyright (C) 2011 NSE-Script: The Nmap Security Scanner; NASL-Wrapper: Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.