Vulnerability Development mailing list archives
CacheFlow external listerner 137/udp
From: Abdulkareem Kusai <kusaiak () altavista com>
Date: 23 May 2001 04:40:25 -0700
An nmap scan of the outside of our new CachFlow OS 3.1.16 systems reveals a process listening on port 137/udp. According to the vendor it "is open as a workaround for older versions of IE that would not run Java applets until name resolution for the server has occurred or timed out. CacheOS does not use or support netbios. The response sent to queries on this port are static "canned" responses and is only sent to improve the responsiveness of IE browsers using the Web Console." CacheFlow OS runs on the very well known x86 CPU instruction set which can be dug into by anyone with the time to do so. Buffer overflow or other vulnerabilities could exist. How to test? Using x86 assembler instructions to perform intrusions? A UDP port 137 listener on the outside interface is a concern. We ask the vendor for instructions how to turn it off. (No response yet.) We dont administer the boxes from the outside. Comments? Find the best deals on the web at AltaVista Shopping! http://www.shopping.altavista.com
Current thread:
- CacheFlow external listerner 137/udp Abdulkareem Kusai (May 23)
- Re: CacheFlow external listerner 137/udp Shoten (May 23)