Troubleshooting
Problem
'12213 - TCP/IP Sequence Prediction Blind Reset Spoofing DoS' is reported when running port scans using Nessus Vulnerability Scanner.
Resolving The Problem
Source
RETAIN tip: H213802
Symptom
'12213 - TCP/IP Sequence Prediction Blind Reset Spoofing DoS'is reported when running port scans using Nessus Vulnerability Scanner.
Affected configurations
The system may be any of the following Lenovo servers:
- NeXtScale nx360 M5, type 5465, any model
- NeXtScale nx360 M5, type 5467, any model
- System x3550 M5, type 5463, any model
- System x3650 M5, type 5462, any model
This tip is not software specific.
This tip is not option specific.
The Nessus utility is affected.
The following system firmware level(s) are affected: IMM Build ID: TCOO02G, TCOO02J and TCOO08IWorkaround
This is a false alert. No fix is needed.
See the reference information below:
http://www.ibm.com/suppor/docview.wss?uid=isg1IY55949
http://www.ibm.com/suppor/docview.wss?uid=isg1IY55950
http://www.ibm.com/suppor/docview.wss?uid=isg1IY62006
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
30 January 2019
UID
ibm1MIGR-5097146