Troubleshooting
Problem
When users run the Nessus tool, the below test case is reported: 12213 - TCP/IP Sequence Prediction Blind Reset Spoofing DoS This is a false alert, and no fix or workaround is needed.
Resolving The Problem
Source
RETAIN tip: H212011
Symptom
When users run the Nessus tool, the below test case is reported:
| 12213 - TCP/IP Sequence Prediction Blind Reset Spoofing DoS |
This is a false alert, and no fix or workaround is needed.
Affected configurations
The system can be any of the following IBM servers:
- System x3530 M4, type 7160, any model
- System x3530 M4, type 7160 E5-xxxxV2, any model
- System x3630 M4, type 7158, any model
- System x3630 M4, type 7158 E5-xxxxV2, any model
This tip is not software specific.
This tip is not option specific.
The Nessus utility is affected.
The following system firmware level is affected: IMM Build ID: 1AOO50I Revision 3.68
The system has the symptom described above.
Workaround
This is false alert. No fix is needed. The below reference information helps users to understand the alert.
- http://www.ibm.com/support/docview.wss?uid=isg1IY55949
- http://www.ibm.com/support/docview.wss?uid=isg1IY55950
- http://www.ibm.com/support/docview.wss?uid=isg1IY62006
Additional information
The following message might be reported when users run the Nessus tool:
| 12213 - TCP/IP Sequence Prediction Blind Reset Spoofing DoS |
This is a false alert, and no fix or workaround is needed. Users can refer to the additional IBM documentation listed in the Workaround section to better understand the alert.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
30 January 2019
UID
ibm1MIGR-5094654