[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-94459-5

Platform: cpe:/o:oracle:linux:8, cpe:/o:redhat:enterprise_linux:8, cpe:/o:redhat:enterprise_linux:9Date: (C)2019-11-07   (M)2023-07-04



To set the runtime status of the 'net.ipv4.conf.all.rp_filter' kernel parameter, run the following command:


Parameter:

[yes/no]


Technical Mechanism:

Enabling reverse path filtering drops packets with source addresses that should not have been able to be received on the interface they were received on. It should not be used on systems which are routers for complicated networks, but is helpful for end hosts and routers serving small networks.

CCSS Severity:CCSS Metrics:
CCSS Score : 8.2Attack Vector: NETWORK
Exploit Score: 3.9Attack Complexity: LOW
Impact Score: 4.2Privileges Required: NONE
Severity: HIGHUser Interaction: NONE
Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:HScope: UNCHANGED
 Confidentiality: LOW
 Integrity: NONE
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:72255
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:55850
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:84129


OVAL    3
oval:org.secpod.oval:def:84129
oval:org.secpod.oval:def:72255
oval:org.secpod.oval:def:55850
XCCDF    3
xccdf_org.secpod_benchmark_general_RHEL_8
xccdf_org.secpod_benchmark_general_OEL_8
xccdf_org.secpod_benchmark_general_RHEL_9

© SecPod Technologies