IBM displays an interesting approach to DoS type problems with this one I think!
Anyone on the nessus list working for IBM like to try to convince the Netview team that excluding things from Nessus scans does not make them secure? I'm sure that what Nessus can do, others can do by design. > IY50013: NVLOCKD CORES AT NESSUS SECURITY PORT SCAN > > APAR status > OPEN > > Error description > =================================================== > NetView for Solaris/AIX 713 > Solaris 2.8 > AIX 4.3.3 > ==================================================== > If a Nessus scan runs against a NetView Server then nvlockd and > other daemons of NetView die with core. > This happens when Nessus executes an open_sock_tcp(port). > Local fix > Don run the scan or exclude the NetView ports. > Problem summary > > Problem conclusion > > Temporary fix > > Comments > > APAR information > APAR number IY50013 > Reported component name TIV NETVIW FOR > Reported component ID 5698NVW05 > Reported release 713 > Status OPEN > PE NoPE > HIPER NoHIPER > Submitted date 2003-10-23 > Closed date > Last modified date 2003-10-29 >
