|Summary:||The echo service is running.|
This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration.
The Echo Service is an unsecured and obsolete protocol and it should be disabled. Historically it has been used to perform denial of service attacks.
|CVSS v3 Severity:||0.0 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)|
|CVSS v2 Severity:||0.0 Low (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:N)|
|Vulnerability Consequences:||Denial of Service|
Type: Caldera International, Inc. Security Advisory SA-1997.33
Vulnerabilities in "inetd" in netkit-base-0.10-1
20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services
ACT WLAN Phone P202S Multiple Security Issues
Type: Vendor Advisory
Type: Novell Technical Information Document #2946023
TCPIP blocking ports (7, 9, 19, etc)
Type: CERT Advisory CA-1996-01
UDP Port Denial-of-Service Attack