Kbase P79759: 3rd party scanning utility interfers with TCP port availability
Autor |
  Progress Software Corporation - Progress |
Acesso |
  Público |
Publicação |
  05/12/2006 |
|
Status: Verified
FACT(s) (Environment):
Progress 9.1x
OpenEdge 10.x
SYMPTOM(s):
Sudden degradation of performance on database server
Users unable to connect to database
No servers are available. Try again later. (1154)
Error reading socket=<n> ret=<n> errno=<n>. (795)
Error reading socket=220 ret=-1 errno=10055. (795)
An operation on a socket could not be performed because the system lacked sufficient buffer space or because a queue was full.
Server's received count <n> does not equal client(<n>)'s send count <n>. (1055)
CHANGE:
Installed third-party scanning utility (Nessus with the "NetOp products TCP detection" plugin activated) to assess security vulnerability.
CAUSE:
Bug # 20050222-012
FIX:
Upgrade to 10.0B02.
Workaround 1:
Ensure Nessus do not scan the host where the Progress database resides is not scanned by Nessus with the
"NeOp products TCP detection" located under the "Service detection" section is deactivated while running
security intrusion detection test against the host or ports where the database resides.
Workaround 2:
Schedule the Nessus security scan while low database activity and schedule a restart of the database
after the scan complete for the host.
Workaround 3:
Remove ports used by Progress from Nessus scan list.