ID CVE-1999-0523
Summary ICMP echo (ping) is allowed from arbitrary hosts.
References
Vulnerable Configurations
CVSS
Base: 0.0 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE NONE
statements via4
contributor Joshua Bressers
lastmodified 2007-09-11
organization Red Hat
statement Red Hat Enterprise Linux by default does respond to ICMP echo requests, although it’s likely that in a production environment those would be filtered by some firewall on entry to your network. However you can happily block ICMP ping responses using iptables if you so wish, but note that there is no known vulnerability in allowing them. For more details, please see: http://kbase.redhat.com/faq/FAQ_43_4304.shtm
Last major update 01-12-2010 - 00:00
Published 01-01-1999 - 00:00
Back to Top