Korean
<< Back
VID 11007
Severity 30
Port 13
Protocol TCP
Class DOS
Detailed Description The daytime service is running. The date format issued by this service may sometimes help an attacker to guess the operating system type.

In addition to that, echo, chargen, time and daytime, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm.

For example, by connecting a host's chargen service to the daytime service on the same or another machine, all affected machines may be effectively taken out of service because of the excessively high number of packets produced. In addition, if two or more hosts are so connected, the intervening network may also become congested and deny service to all hosts whose traffic traverses that network.

* References:
http://www.iss.net/security_center/static/400.php
Recommendation We recommend taking all the steps described below.

1. Disable and filter chargen, echo services and other unused UDP services.
2. If you must provide external access to some UDP services, consider using a proxy mechanism to protect that service from misuse.

*Solaris 10, Solaris 11:
svcadm disable svc:/network/daytime:dgram
svcadm disable svc:/network/daytime:stream

*Enterprise Linux 6.4, CentOS 6.4, Fedora 19:
Open /etc/xinetd.d/daytime-dgram and /etc/xinetd.d/daytime-stream and then set disable=yes
and then restart xinetd
Related URL CVE-1999-0638 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)