SLES-12-030040 |
V2R11 |
SuSEfirewall2 must protect against or limit the effects of Denial-of-Service (DoS) attacks on the SUSE operating system by implementing rate-limiting measures on impacted network interfaces. |
|
RHEL-08-040150 |
V1R3 |
A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring RHEL 8 can implement rate-limiting measures on impacted network interfaces. |
|
UBTU-20-010446 |
V1R12 |
The Ubuntu operating system must configure the uncomplicated firewall to rate-limit impacted network interfaces. |
|
WN11-CC-000035 |
V2R2 |
The system must be configured to ignore NetBIOS name release requests except from WINS servers. |
|
WN11-CC-000220 |
V2R2 |
File Explorer heap termination on corruption must be disabled. |
|
WN10-CC-000035 |
V3R2 |
The system must be configured to ignore NetBIOS name release requests except from WINS servers. |
|
WN10-CC-000220 |
V3R2 |
Turning off File Explorer heap termination on corruption must be disabled. |
|
WN19-CC-000060 |
V3R2 |
Windows Server 2019 must be configured to ignore NetBIOS name release requests except from WINS servers. |
|
UBTU-22-251025 |
V2R2 |
Ubuntu 22.04 LTS must configure the Uncomplicated Firewall (ufw) to rate-limit impacted network interfaces. |
|
WN16-CC-000070 |
V2R7 |
Windows Server 2016 must be configured to ignore NetBIOS name release requests except from WINS servers. |
|
WN22-CC-000060 |
V1R4 |
Windows Server 2022 must be configured to ignore NetBIOS name release requests except from WINS servers. |
|
RHEL-09-251030 |
V1R3 |
RHEL 9 must protect against or limit the effects of denial-of-service (DoS) attacks by ensuring rate-limiting measures on impacted network interfaces are implemented. |
|
UBTU-18-010512 |
V2R11 |
The Ubuntu operating system must configure the uncomplicated firewall to rate-limit impacted network interfaces. |
|
OL07-00-040510 |
V2R11 |
The Oracle Linux operating system must protect against or limit the effects of Denial of Service (DoS) attacks by validating the operating system is implementing rate-limiting measures on impacted network interfaces. |
|