IBM displays an interesting approach to DoS type problems with this one I think!

Anyone on the nessus list working for IBM like to try to convince the Netview team 
that excluding things from Nessus scans does not make them secure? I'm sure that what 
Nessus can do, others can do by design.

> IY50013: NVLOCKD CORES AT NESSUS SECURITY PORT SCAN   
> 
> APAR status   
> OPEN 
>       
> Error description     
> ===================================================
> NetView for Solaris/AIX 713
> Solaris 2.8
> AIX 4.3.3
> ====================================================
> If a Nessus scan runs against a NetView Server then nvlockd and
> other daemons of NetView die with core.
> This happens when Nessus executes an open_sock_tcp(port).
> Local fix     
> Don run the scan or exclude the NetView ports.
> Problem summary       
>       
> Problem conclusion    
>       
> Temporary fix 
>       
> Comments      
>       
> APAR information      
> APAR number   IY50013 
> Reported component name       TIV NETVIW FOR  
> Reported component ID 5698NVW05       
> Reported release      713     
> Status        OPEN    
> PE    NoPE    
> HIPER NoHIPER 
> Submitted date        2003-10-23      
> Closed date           
> Last modified date    2003-10-29      
> 

Reply via email to