Results 1 to 3 of 3

Thread: IGMP/pimp vuln. detected by Nessus

  1. #1
    Join Date
    Sep 2008
    Beans
    551
    Distro
    Ubuntu 16.04 Xenial Xerus

    IGMP/pimp vuln. detected by Nessus

    Hi everyone, I was recently doing a Nessus scan on my Ubuntu pc from a Windows machine running the Nessus scanner. I honestly didnt expect it to find anything beyond my open SSH/web servers, which for the most part it did aside from one security hole it found described here: http://www.nessus.org/plugins/index....ingle&id=10179 .

    Essentially its a DOS vulnerability and Im not sure how to fix the problem or if its a false positive and I should ignore it.

    Based on my google searching, all I could find was that earlier versions of the Linux kernel were vulnerable to this, however Im using Intrepid with the latest updates so my kernel version is newer and should be patched against this.

    My question is should I file this as a bug against the current kernel, is there a fix anyone knows of, or is there a way for me to determine if its a false positive?

    The only reason im concerned is because some posts ive read suggest that this vulnerability could also be exploited to gain root privs on the machine as well.

    Thanks.

  2. #2
    Join Date
    Mar 2008
    Beans
    1,755

    Re: IGMP/pimp vuln. detected by Nessus

    Personally, I would just follow the advice of what you posted:


    "Solution : filter incoming IGMP traffic"


    Add it your iptables rules.

  3. #3
    Join Date
    Sep 2008
    Beans
    551
    Distro
    Ubuntu 16.04 Xenial Xerus

    Re: IGMP/pimp vuln. detected by Nessus

    I use Firestarter, im not familiar with working with iptables directly yet.

    Is there anyway I can use Firestarter to block this? Or what would be the command I would need to run. Ive google for how to block it but all I come up with are hits for ICMP.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •