Nessus Scan Report
This report gives details on hosts that were tested and issues that were found. Please follow the recommended steps and procedures to eradicate these threats.

Scan Details
Hosts which were alive and responding during test 6
Number of security holes found 28
Number of security warnings found 18


Host List
Host(s) Possible Issue
192.168.1.112 Security note(s) found
192.168.1.113 Security warning(s) found
192.168.1.114 Security warning(s) found
192.168.1.115 Security warning(s) found
192.168.1.110 Security hole(s) found
192.168.1.111 Security hole(s) found
[ return to top ]


Analysis of Host
Address of Host Port/Service Issue regarding Port
192.168.1.112 general/tcp Security notes found
192.168.1.112 general/icmp Security notes found
192.168.1.112 general/udp Security notes found
192.168.1.112 daytime (13/tcp) Security notes found
192.168.1.112 mysql (3306/tcp) Security notes found
192.168.1.112 time (37/tcp) Security notes found
192.168.1.112 ident (113/tcp) Security notes found
192.168.1.112 http (80/tcp) Security notes found


Security Issues and Fixes: 192.168.1.112
Type Port Issue and Fix
Informational general/tcp Information about this scan :

Nessus version : 4.0.1
Plugin feed version : 200906301334
Type of plugin feed : HomeFeed (Non-commercial use only)
Scanner IP : 192.168.1.106
Port scanner(s) : nessus_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Optimize the test : yes
CGI scanning : disabled
Web application tests : disabled
Max hosts : 20
Max checks : 4
Recv timeout : 5
Backports : None
Scan Start Date : 2009/7/2 12:33
Scan duration : 56 sec

Nessus ID : 19506
Informational general/tcp 192.168.1.112 resolves as 192-168-1-112.tpgi.com.au.
Nessus ID : 12053
Informational general/tcp
Synopsis :

The manufacturer can be deduced from the Ethernet OUI.

Description :

Each ethernet MAC address starts with a 24-bit 'Organizationally
Unique Identifier'.
These OUI are registered by IEEE.

See also :

http://standards.ieee.org/faqs/OUI.html
http://standards.ieee.org/regauth/oui/index.shtml

Risk factor :

None

Plugin output :

The following card manufacturers were identified :

00:0c:29:86:b9:cc : VMware, Inc.

Nessus ID : 35716
Informational general/tcp Synopsis :

The remote host seems to be a VMware virtual machine.

Description :

According to the MAC address of its network adapter, the remote host
is a VMware virtual machine.

Since it is physically accessible through the network, ensure that its
configuration matches your organization's security policy.

Risk factor :

None
Nessus ID : 20094
Informational general/icmp
Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date which is set on your machine.

This may help him to defeat all your time based authentication
protocols.

Solution :

Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None

Plugin output :

The difference between the local and remote clocks is -36018 seconds.

CVE : CVE-1999-0524
Nessus ID : 10114
Informational general/udp For your information, here is the traceroute from 192.168.1.106 to 192.168.1.112 :
192.168.1.106
192.168.1.112

Nessus ID : 10287
Informational daytime (13/tcp)
Synopsis :

A daytime service is running on the remote host

Description :

The remote host is running a 'daytime' service. This service is
designed to give the local time of the day of this host to whoever
connects to this port.

The date format issued by this service may sometimes help an attacker
to guess the operating system type of this host, or to set up timed
authentication attacks against the remote host.

In addition, if the daytime service is running on a UDP port, an
attacker may link it to the echo port of a third-party host using
spoofing, thus creating a possible denial of service condition between
this host and the third party.

Solution :

- Under Unix systems, comment out the 'daytime' line in /etc/inetd.conf
and restart the inetd process

- Under Windows systems, set the following registry keys to 0 :
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableTcpDaytime
HKLM\System\CurrentControlSet\Services\SimpTCP\Parameters\EnableUdpDaytime

Then launch cmd.exe and type :

net stop simptcp
net start simptcp

To restart the service.

Risk factor :

None

CVE : CVE-1999-0103
Nessus ID : 10052
Informational daytime (13/tcp) A DAYTIME server is running on this port
Nessus ID : 17975
Informational mysql (3306/tcp) Synopsis :

A database server is listening on the remote port.

Description :

The remote host is running MySQL, an open-source database server. The
remote database access is restricted and configured to reject access
from not allowed IPs. Therefore it was not possible to extract its
version number.

Risk factor :

None
Nessus ID : 10719
Informational mysql (3306/tcp) A MySQL server is running on this port.
Nessus ID : 22964
Informational time (37/tcp) A time server is running on this port.
Nessus ID : 22964
Informational ident (113/tcp)
Synopsis :

The remote host is running an identification service.

Description :

The remote host is running an ident (also known as 'auth') daemon.

The 'ident' service provides sensitive information to potential
attackers. It is designed to say which accounts are running which
services. This helps attackers to focus on valuable services (those
owned by root or other privileged accounts). If you do not use this
service, and software you run does not require it, disable it.

Solution :

If you do not use this service and software you run does not require
it, disable it.

Risk factor :

None

CVE : CVE-1999-0629
Nessus ID : 10021
Informational ident (113/tcp) An identd server is running on this port.
Nessus ID : 22964
Informational http (80/tcp)
Synopsis :

Some information about the remote HTTP configuration can be extracted.

Description :

This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
etc...

This test is informational only and does not denote any security
problem.

Risk factor :

None

Plugin output :

Protocol version : HTTP/1.1
SSL : no
Pipelining : yes
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :

Date: Thu, 02 Jul 2009 12:34:29 GMT
Server: Apache
WWW-Authenticate: Basic realm="MyNmap"
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=iso-8859-1

Nessus ID : 24260
Informational http (80/tcp)
Synopsis :

A web server is running on the remote host.

Description :

This plugin attempts to determine the type and the version of
the remote web server.

Risk factor :

None

Plugin output :

The remote web server type is :

Apache

and the 'ServerTokens' directive is ProductOnly
Apache does not offer a way to hide the server type.

Nessus ID : 10107
Informational http (80/tcp) A web server is running on this port.
Nessus ID : 22964
[ return to top ]


Analysis of Host
Address of Host Port/Service Issue regarding Port
192.168.1.113 general/icmp Security notes found
192.168.1.113 general/tcp Security notes found
192.168.1.113 general/udp Security notes found
192.168.1.113 ntp (123/udp) Security notes found
192.168.1.113 ntp-gps-data (12321/tcp) Security notes found
192.168.1.113 https (443/tcp) Security warning(s) found
192.168.1.113 http (80/tcp) Security warning(s) found
192.168.1.113 ssh (22/tcp) Security notes found


Security Issues and Fixes: 192.168.1.113
Type Port Issue and Fix
Informational general/icmp
Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date which is set on your machine.

This may help him to defeat all your time based authentication
protocols.

Solution :

Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None

Plugin output :

The difference between the local and remote clocks is -20 seconds.

CVE : CVE-1999-0524
Nessus ID : 10114
Informational general/tcp Information about this scan :

Nessus version : 4.0.1
Plugin feed version : 200906301334
Type of plugin feed : HomeFeed (Non-commercial use only)
Scanner IP : 192.168.1.106
Port scanner(s) : nessus_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Optimize the test : yes
CGI scanning : disabled
Web application tests : disabled
Max hosts : 20
Max checks : 4
Recv timeout : 5
Backports : Detected
Scan Start Date : 2009/7/2 12:33
Scan duration : 83 sec

Nessus ID : 19506
Informational general/tcp
Remote operating system : Linux Kernel 2.6 on Ubuntu Linux 8.04 (hardy)
Confidence Level : 95
Method : SSH


The remote host is running Linux Kernel 2.6 on Ubuntu Linux 8.04 (hardy)
Nessus ID : 11936
Informational general/tcp 192.168.1.113 resolves as 192-168-1-113.tpgi.com.au.
Nessus ID : 12053
Informational general/tcp
Synopsis :

The manufacturer can be deduced from the Ethernet OUI.

Description :

Each ethernet MAC address starts with a 24-bit 'Organizationally
Unique Identifier'.
These OUI are registered by IEEE.

See also :

http://standards.ieee.org/faqs/OUI.html
http://standards.ieee.org/regauth/oui/index.shtml

Risk factor :

None

Plugin output :

The following card manufacturers were identified :

00:0c:29:8b:e1:46 : VMware, Inc.

Nessus ID : 35716
Informational general/tcp Synopsis :

The remote host seems to be a VMware virtual machine.

Description :

According to the MAC address of its network adapter, the remote host
is a VMware virtual machine.

Since it is physically accessible through the network, ensure that its
configuration matches your organization's security policy.

Risk factor :

None
Nessus ID : 20094
Informational general/tcp Synopsis :

The remote service implements TCP timestamps.

Description :

The remote host implements TCP timestamps, as defined by RFC1323.
A side effect of this feature is that the uptime of the remote
host can sometimes be computed.

See also :

http://www.ietf.org/rfc/rfc1323.txt

Risk factor :

None
Nessus ID : 25220
Informational general/udp For your information, here is the traceroute from 192.168.1.106 to 192.168.1.113 :
192.168.1.106
192.168.1.113

Nessus ID : 10287
Informational ntp (123/udp) Synopsis :

An NTP server is listening on the remote host.

Description :

An NTP (Network Time Protocol) server is listening on this port. It
provides information about the current date and time of the remote
system and may provide system information.

Risk factor :

None
Nessus ID : 10884
Informational ntp-gps-data (12321/tcp)
Synopsis :

Some information about the remote HTTP configuration can be extracted.

Description :

This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
etc...

This test is informational only and does not denote any security
problem.

Risk factor :

None

Plugin output :

Protocol version : HTTP/1.0
SSL : yes
Pipelining : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Date: Thu, 2 Jul 2009 02:34:55 GMT
Server: MiniServ/0.01
Connection: close
Set-Cookie: testing=1; path=/; secure
pragma: no-cache
Expires: Thu, 1 Jan 1970 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-type: text/html; Charset=iso-8859-1

Nessus ID : 24260
Informational ntp-gps-data (12321/tcp)
Synopsis :

A web server is running on the remote host.

Description :

This plugin attempts to determine the type and the version of
the remote web server.

Risk factor :

None

Plugin output :

The remote web server type is :

MiniServ/0.01

Nessus ID : 10107
Informational ntp-gps-data (12321/tcp)
Synopsis :

An administration service is running on the remote host.

Description :

The remote server is running Webmin, a web-based interface for
system administration for Unix.

See also :

http://www.webmin.net/

Solution:

Stop the Webmin service if not needed or ensure access is limited to
authorized hosts. See the menu items '[Webmin Configuration][IP
Access Control]' and/or '[Webmin Configuration][Port and Address]'.

Risk factor :

None
Nessus ID : 10757
Informational ntp-gps-data (12321/tcp) Synopsis :

An SSL detection issue might impede the Nessus Scan.

Description :

Nessus has discovered that it is talking in plain HTTP on a SSL port.

Nessus has corrected this issue by enabling HTTPS for this port only.
However if other SSL ports are used on the remote host, they might be
skipped.

Solution :

Enable SSL tests in the 'Services' preference setting, or increase the
timeouts if this option is already set and the plugin missed this
port.

Risk factor :

None
Nessus ID : 15588
Informational ntp-gps-data (12321/tcp) A web server is running on this port.
Nessus ID : 22964
Warning https (443/tcp) Synopsis :

Debugging functions are enabled on the remote web server.

Description :

The remote webserver supports the TRACE and/or TRACK methods. TRACE
and TRACK are HTTP methods which are used to debug web server
connections.

In addition, it has been shown that servers supporting the TRACE
method are subject to cross-site scripting attacks, dubbed XST for
"Cross-Site Tracing", when used in conjunction with various weaknesses
in browsers. An attacker may use this flaw to trick your legitimate
web users to give him their credentials.

See also :

http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf
http://www.apacheweek.com/issues/03-01-24
http://www.kb.cert.org/vuls/id/288308
http://www.kb.cert.org/vuls/id/867593

Solution :

Disable these methods.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Solution :

Add the following lines for each virtual host in your configuration file :

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Plugin output :

Nessus sent the following TRACE request :

------------------------------ snip ------------------------------
TRACE /Nessus328464772.html HTTP/1.1
Connection: Close
Host: 192-168-1-113.tpgi.com.au
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Thu, 02 Jul 2009 02:34:54 GMT
Server: Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus328464772.html HTTP/1.1
Connection: Keep-Alive
Host: 192-168-1-113.tpgi.com.au
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

CVE : CVE-2003-1567, CVE-2004-2320
BID : 9506, 9561, 11604, 33374
Other references : OSVDB:877, OSVDB:3726, OSVDB:5648
Nessus ID : 11213
Warning https (443/tcp) Synopsis :

The remote service supports the use of weak SSL ciphers.

Description :

The remote host supports the use of SSL ciphers that offer either weak
encryption or no encryption at all.

See also :

http://www.openssl.org/docs/apps/ciphers.html

Solution :

Reconfigure the affected application if possible to avoid use of weak
ciphers.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Plugin output :

Here is the list of weak SSL ciphers supported by the remote server :

Low Strength Ciphers (< 56-bit key)
SSLv2
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
SSLv3
EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
TLSv1
EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

Nessus ID : 26928
Warning https (443/tcp)
Synopsis :

The remote service encrypts traffic using a protocol with known
weaknesses.

Description :

The remote service accepts connections encrypted using SSL 2.0, which
reportedly suffers from several cryptographic flaws and has been
deprecated for several years. An attacker may be able to exploit
these issues to conduct man-in-the-middle attacks or decrypt
communications between the affected service and clients.

See also :

http://www.schneier.com/paper-ssl.pdf

Solution :

Consult the application's documentation to disable SSL 2.0 and use SSL
3.0 or TLS 1.0 instead.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Nessus ID : 20007
Informational https (443/tcp)
Synopsis :

Security patches are backported.

Description :

Security patches may have been 'back ported' to the remote HTTP server
without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Solution :

Give Nessus credentials to perform local checks.

Risk factor :

None

Nessus ID : 39521
Informational https (443/tcp)
Synopsis :

Some information about the remote HTTP configuration can be extracted.

Description :

This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
etc...

This test is informational only and does not denote any security
problem.

Risk factor :

None

Plugin output :

Protocol version : HTTP/1.1
SSL : yes
Pipelining : yes
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :

Date: Thu, 02 Jul 2009 02:34:54 GMT
Server: Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g
X-Powered-By: PHP/5.2.4-2ubuntu5.5
X-Pingback: http://192-168-1-113.tpgi.com.au/xmlrpc.php
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8

Nessus ID : 24260
Informational https (443/tcp)
Synopsis :

A web server is running on the remote host.

Description :

This plugin attempts to determine the type and the version of
the remote web server.

Risk factor :

None

Plugin output :

The remote web server type is :

Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g


Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
Nessus ID : 10107
Informational https (443/tcp)
Synopsis :

The remote service encrypts communications using SSL.

Description :

This script detects which SSL ciphers are supported by the remote
service for encrypting communications.

See also :

http://www.openssl.org/docs/apps/ciphers.html

Risk factor :

None

Plugin output :

Here is the list of SSL ciphers supported by the remote server :

Low Strength Ciphers (< 56-bit key)
SSLv2
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
SSLv3
EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
TLSv1
EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export

Medium Strength Ciphers (>= 56-bit and < 112-bit key)
SSLv2
DES-CBC-MD5 Kx=RSA Au=RSA Enc=DES(56) Mac=MD5
SSLv3
EDH-RSA-DES-CBC-SHA Kx=DH Au=RSA Enc=DES(56) Mac=SHA1
DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1
TLSv1
EDH-RSA-DES-CBC-SHA Kx=DH Au=RSA Enc=DES(56) Mac=SHA1
DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1

High Strength Ciphers (>= 112-bit key)
SSLv2
DES-CBC3-MD5 Kx=RSA Au=RSA Enc=3DES(168) Mac=MD5
RC2-CBC-MD5 Kx=RSA Au=RSA Enc=RC2(128) Mac=MD5
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
SSLv3
EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
TLSv1
EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

Nessus ID : 21643
Informational https (443/tcp) Synopsis :

This plugin displays the SSL certificate.

Description :

This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.

Risk factor :

None

Plugin output :

Subject Name:

Organization: TurnKey Linux
Organization Unit: Software appliances

Issuer Name:

Organization: TurnKey Linux
Organization Unit: Software appliances

Serial Number: 00 AE 04 54 7C F3 DD 37 40

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Dec 17 18:41:21 2008 GMT
Not Valid After: Dec 15 18:41:21 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Public Key: 00 BA 7E 9D 56 56 59 F5 6F 51 E4 26 58 40 79 EA AE E2 65 11
A7 E1 5E 84 63 AF 5E FA 68 D6 DA AA DA 52 17 82 3B CB B6 35
CD 03 07 16 73 42 13 7A EB 0D 50 43 6A BE 42 CF 85 7E 9A F5
EF 52 C7 B3 51
Exponent: 01 00 01

Signature: 00 22 55 CA E4 64 07 F2 41 D0 07 A6 06 24 EE 92 F4 06 0C 4B
EB 25 23 3C 99 AD 05 3A 34 2C 17 B1 D5 E4 A5 C9 FD B6 F0 FF
79 95 C0 34 DF 86 CF E7 A5 6F 28 9A AC 91 42 B5 DA 0D 51 12
C0 85 3C 6D 80

Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 4C 50 91 92 CA 1D FD A8 8E 81 BC 38 54 06 E5 30 EC EB 12 2F


Extension: Authority Key Identifier (2.5.29.35)
Critical: 0


Extension: Basic Constraints (2.5.29.19)
Critical: 0
Data: 30 03 01 01 FF

Nessus ID : 10863
Informational https (443/tcp) A web server is running on this port through SSLv2.
Nessus ID : 22964
Informational https (443/tcp) An SSLv2 server answered on this port.

Nessus ID : 22964
Warning http (80/tcp) Synopsis :

Debugging functions are enabled on the remote web server.

Description :

The remote webserver supports the TRACE and/or TRACK methods. TRACE
and TRACK are HTTP methods which are used to debug web server
connections.

In addition, it has been shown that servers supporting the TRACE
method are subject to cross-site scripting attacks, dubbed XST for
"Cross-Site Tracing", when used in conjunction with various weaknesses
in browsers. An attacker may use this flaw to trick your legitimate
web users to give him their credentials.

See also :

http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf
http://www.apacheweek.com/issues/03-01-24
http://www.kb.cert.org/vuls/id/288308
http://www.kb.cert.org/vuls/id/867593

Solution :

Disable these methods.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Solution :

Add the following lines for each virtual host in your configuration file :

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Plugin output :

Nessus sent the following TRACE request :

------------------------------ snip ------------------------------
TRACE /Nessus1556226787.html HTTP/1.1
Connection: Close
Host: 192-168-1-113.tpgi.com.au
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Thu, 02 Jul 2009 02:34:54 GMT
Server: Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus1556226787.html HTTP/1.1
Connection: Close
Host: 192-168-1-113.tpgi.com.au
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

CVE : CVE-2003-1567, CVE-2004-2320
BID : 9506, 9561, 11604, 33374
Other references : OSVDB:877, OSVDB:3726, OSVDB:5648
Nessus ID : 11213
Informational http (80/tcp)
Synopsis :

Security patches are backported.

Description :

Security patches may have been 'back ported' to the remote HTTP server
without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Solution :

Give Nessus credentials to perform local checks.

Risk factor :

None

Nessus ID : 39521
Informational http (80/tcp)
Synopsis :

Some information about the remote HTTP configuration can be extracted.

Description :

This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
etc...

This test is informational only and does not denote any security
problem.

Risk factor :

None

Plugin output :

Protocol version : HTTP/1.1
SSL : no
Pipelining : yes
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :

Date: Thu, 02 Jul 2009 02:34:53 GMT
Server: Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g
X-Powered-By: PHP/5.2.4-2ubuntu5.5
X-Pingback: http://192-168-1-113.tpgi.com.au/xmlrpc.php
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8

Nessus ID : 24260
Informational http (80/tcp)
Synopsis :

A web server is running on the remote host.

Description :

This plugin attempts to determine the type and the version of
the remote web server.

Risk factor :

None

Plugin output :

The remote web server type is :

Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g


Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
Nessus ID : 10107
Informational http (80/tcp) A web server is running on this port.
Nessus ID : 22964
Informational ssh (22/tcp)
Synopsis :

Security patches are backported.

Description :

Security patches may have been 'back ported' to the remote SSH server
without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Solution :

Give Nessus credentials to perform local checks.

Risk factor :

None

Nessus ID : 39520
Informational ssh (22/tcp)
Synopsis :

An SSH server is running on the remote host.

Description :

This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.

Risk factor :

None

Plugin output :

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0


SSHv2 host key fingerprint : c0:be:ab:cc:3a:14:21:d5:de:45:a6:66:01:d5:56:32

Nessus ID : 10881
Informational ssh (22/tcp) Synopsis :

An SSH server is listening on this port.

Description :

It is possible to obtain information about the remote SSH
server by sending an empty authentication request.

Risk factor :

None

Plugin output :

SSH version : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1.2

Nessus ID : 10267
Informational ssh (22/tcp) An SSH server is running on this port.
Nessus ID : 22964
[ return to top ]


Analysis of Host
Address of Host Port/Service Issue regarding Port
192.168.1.114 general/tcp Security notes found
192.168.1.114 general/udp Security notes found
192.168.1.114 general/icmp Security warning(s) found
192.168.1.114 router (520/udp) Security notes found
192.168.1.114 sunrpc (111/udp) Security notes found
192.168.1.114 submission (587/tcp) Security notes found
192.168.1.114 ssh (22/tcp) Security notes found
192.168.1.114 smtp (25/tcp) Security warning(s) found
192.168.1.114 sunrpc (111/tcp) Security notes found


Security Issues and Fixes: 192.168.1.114
Type Port Issue and Fix
Informational general/tcp
Remote operating system : Sun Solaris 10
Sun Solaris 9
Confidence Level : 54
Method : SinFP


The remote host is running one of these operating systems :
Sun Solaris 10
Sun Solaris 9
Nessus ID : 11936
Informational general/tcp Information about this scan :

Nessus version : 4.0.1
Plugin feed version : 200906301334
Type of plugin feed : HomeFeed (Non-commercial use only)
Scanner IP : 192.168.1.106
Port scanner(s) : nessus_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Optimize the test : yes
CGI scanning : disabled
Web application tests : disabled
Max hosts : 20
Max checks : 4
Recv timeout : 5
Backports : None
Scan Start Date : 2009/7/2 12:33
Scan duration : 70 sec

Nessus ID : 19506
Informational general/tcp 192.168.1.114 resolves as 192-168-1-114.tpgi.com.au.
Nessus ID : 12053
Informational general/tcp
Synopsis :

The manufacturer can be deduced from the Ethernet OUI.

Description :

Each ethernet MAC address starts with a 24-bit 'Organizationally
Unique Identifier'.
These OUI are registered by IEEE.

See also :

http://standards.ieee.org/faqs/OUI.html
http://standards.ieee.org/regauth/oui/index.shtml

Risk factor :

None

Plugin output :

The following card manufacturers were identified :

00:0c:29:7e:92:b3 : VMware, Inc.

Nessus ID : 35716
Informational general/tcp Synopsis :

The remote host seems to be a VMware virtual machine.

Description :

According to the MAC address of its network adapter, the remote host
is a VMware virtual machine.

Since it is physically accessible through the network, ensure that its
configuration matches your organization's security policy.

Risk factor :

None
Nessus ID : 20094
Informational general/udp For your information, here is the traceroute from 192.168.1.106 to 192.168.1.114 :
192.168.1.106
192.168.1.114

Nessus ID : 10287
Warning general/icmp
Synopsis :

The remote host leaks memory in network packets.

Description :

The remote host is vulnerable to an 'Etherleak' - the remote ethernet
driver seems to leak bits of the content of the memory of the remote
operating system.

Note that an attacker may take advantage of this flaw only when its
target is on the same physical subnet.

See also :

http://www.atstake.com/research/advisories/2003/a010603-1.txt

Solution :

Contact your vendor for a fix

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE : CVE-2003-0001
BID : 6535
Other references : OSVDB:3873
Nessus ID : 11197
Informational router (520/udp) A RIP-2 agent is running on this port.

Risk factor: None
Nessus ID : 11822
Informational sunrpc (111/udp) Synopsis :

An ONC RPC service is running on the remote host.

Description :

By sending a DUMP request to the portmapper, it was possible to
enumerate the ONC RPC services running on the remote port. Using this
information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Risk factor :

None

Plugin output :

The following RPC services are available on UDP port 111 :

- program: 100000 (portmapper), version: 4
- program: 100000 (portmapper), version: 3
- program: 100000 (portmapper), version: 2

Nessus ID : 11111
Informational submission (587/tcp)
Synopsis :

An SMTP server is listening on the remote port.

Description :

The remote host is running a mail (SMTP) server on this port.

Since SMTP servers are the targets of spammers, it is recommended you
disable it if you do not use it.

Solution :

Disable this service if you do not use it, or filter incoming traffic
to this port.

Risk factor :

None

Plugin output :

Remote SMTP server banner :

220 opensolaris-vm.local ESMTP Sendmail 8.14.2+Sun/8.14.2; Wed, 1 Jul 2009 19:33:58 -0700 (PDT)

Nessus ID : 10263
Informational submission (587/tcp) An SMTP server is running on this port.
Nessus ID : 22964
Informational ssh (22/tcp)
Synopsis :

An SSH server is running on the remote host.

Description :

This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.

Risk factor :

None

Plugin output :

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0


SSHv2 host key fingerprint : e5:79:27:a6:3b:92:e1:83:03:e8:a8:55:68:21:0f:ba

Nessus ID : 10881
Informational ssh (22/tcp) Synopsis :

An SSH server is listening on this port.

Description :

It is possible to obtain information about the remote SSH
server by sending an empty authentication request.

Risk factor :

None

Plugin output :

SSH version : SSH-2.0-Sun_SSH_1.2
SSH supported authentication : gssapi-keyex,gssapi-with-mic,publickey,password,keyboard-interactive

Nessus ID : 10267
Informational ssh (22/tcp) An SSH server is running on this port.
Nessus ID : 22964
Warning smtp (25/tcp) Synopsis :

It is possible to enumerate the names of valid users on the remote
host.

Description :

The remote SMTP server answers to the EXPN and/or VRFY commands.

The EXPN command can be used to find the delivery address of mail
aliases, or even the full name of the recipients, and the VRFY command
may be used to check the validity of an account.

Your mailer should not allow remote users to use any of these
commands, because it gives them too much information.

Solution :

If you are using Sendmail, add the option :

O PrivacyOptions=goaway

in /etc/sendmail.cf.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Plugin output :

EXPN root produces the following output :

250 2.1.5 <[email protected]>


VRFY root produces the following output :

250 2.1.5 <[email protected]>

Other references : OSVDB:12551
Nessus ID : 10249
Informational smtp (25/tcp)
Synopsis :

An SMTP server is listening on the remote port.

Description :

The remote host is running a mail (SMTP) server on this port.

Since SMTP servers are the targets of spammers, it is recommended you
disable it if you do not use it.

Solution :

Disable this service if you do not use it, or filter incoming traffic
to this port.

Risk factor :

None

Plugin output :

Remote SMTP server banner :

220 opensolaris-vm.local ESMTP Sendmail 8.14.2+Sun/8.14.2; Wed, 1 Jul 2009 19:33:48 -0700 (PDT)

Nessus ID : 10263
Informational smtp (25/tcp) An SMTP server is running on this port.
Nessus ID : 22964
Informational sunrpc (111/tcp) Synopsis :

An ONC RPC service is running on the remote host.

Description :

By sending a DUMP request to the portmapper, it was possible to
enumerate the ONC RPC services running on the remote port. Using this
information, it is possible to connect and bind to each service by
sending an RPC request to the remote port.

Risk factor :

None

Plugin output :

The following RPC services are available on TCP port 111 :

- program: 100000 (portmapper), version: 4
- program: 100000 (portmapper), version: 3
- program: 100000 (portmapper), version: 2

Nessus ID : 11111
Informational sunrpc (111/tcp) Synopsis :

An ONC RPC portmapper is running on the remote host.

Description :

The RPC portmapper is running on this port.

The portmapper allows someone to get the port number of each RPC
service running on the remote host by sending either multiple lookup
requests or a DUMP request.

Risk factor :

None
Nessus ID : 10223
[ return to top ]


Analysis of Host
Address of Host Port/Service Issue regarding Port
192.168.1.115 general/icmp Security notes found
192.168.1.115 general/tcp Security notes found
192.168.1.115 general/udp Security notes found
192.168.1.115 ntp (123/udp) Security notes found
192.168.1.115 ntp-gps-data (12321/tcp) Security notes found
192.168.1.115 https (443/tcp) Security warning(s) found
192.168.1.115 http (80/tcp) Security warning(s) found
192.168.1.115 ssh (22/tcp) Security notes found


Security Issues and Fixes: 192.168.1.115
Type Port Issue and Fix
Informational general/icmp
Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date which is set on your machine.

This may help him to defeat all your time based authentication
protocols.

Solution :

Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None

Plugin output :

The difference between the local and remote clocks is -20 seconds.

CVE : CVE-1999-0524
Nessus ID : 10114
Informational general/tcp Information about this scan :

Nessus version : 4.0.1
Plugin feed version : 200906301334
Type of plugin feed : HomeFeed (Non-commercial use only)
Scanner IP : 192.168.1.106
Port scanner(s) : nessus_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Optimize the test : yes
CGI scanning : disabled
Web application tests : disabled
Max hosts : 20
Max checks : 4
Recv timeout : 5
Backports : Detected
Scan Start Date : 2009/7/2 12:33
Scan duration : 146 sec

Nessus ID : 19506
Informational general/tcp
Remote operating system : Linux Kernel 2.6 on Ubuntu Linux 8.04 (hardy)
Confidence Level : 95
Method : SSH


The remote host is running Linux Kernel 2.6 on Ubuntu Linux 8.04 (hardy)
Nessus ID : 11936
Informational general/tcp 192.168.1.115 resolves as 192-168-1-115.tpgi.com.au.
Nessus ID : 12053
Informational general/tcp
Synopsis :

The manufacturer can be deduced from the Ethernet OUI.

Description :

Each ethernet MAC address starts with a 24-bit 'Organizationally
Unique Identifier'.
These OUI are registered by IEEE.

See also :

http://standards.ieee.org/faqs/OUI.html
http://standards.ieee.org/regauth/oui/index.shtml

Risk factor :

None

Plugin output :

The following card manufacturers were identified :

00:0c:29:12:e9:9b : VMware, Inc.

Nessus ID : 35716
Informational general/tcp Synopsis :

The remote host seems to be a VMware virtual machine.

Description :

According to the MAC address of its network adapter, the remote host
is a VMware virtual machine.

Since it is physically accessible through the network, ensure that its
configuration matches your organization's security policy.

Risk factor :

None
Nessus ID : 20094
Informational general/tcp Synopsis :

The remote service implements TCP timestamps.

Description :

The remote host implements TCP timestamps, as defined by RFC1323.
A side effect of this feature is that the uptime of the remote
host can sometimes be computed.

See also :

http://www.ietf.org/rfc/rfc1323.txt

Risk factor :

None
Nessus ID : 25220
Informational general/udp For your information, here is the traceroute from 192.168.1.106 to 192.168.1.115 :
192.168.1.106
192.168.1.115

Nessus ID : 10287
Informational ntp (123/udp) Synopsis :

An NTP server is listening on the remote host.

Description :

An NTP (Network Time Protocol) server is listening on this port. It
provides information about the current date and time of the remote
system and may provide system information.

Risk factor :

None
Nessus ID : 10884
Informational ntp-gps-data (12321/tcp)
Synopsis :

Some information about the remote HTTP configuration can be extracted.

Description :

This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
etc...

This test is informational only and does not denote any security
problem.

Risk factor :

None

Plugin output :

Protocol version : HTTP/1.0
SSL : yes
Pipelining : no
Keep-Alive : no
Options allowed : (Not implemented)
Headers :

Date: Thu, 2 Jul 2009 02:35:23 GMT
Server: MiniServ/0.01
Connection: close
Set-Cookie: testing=1; path=/; secure
pragma: no-cache
Expires: Thu, 1 Jan 1970 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Content-type: text/html; Charset=iso-8859-1

Nessus ID : 24260
Informational ntp-gps-data (12321/tcp)
Synopsis :

A web server is running on the remote host.

Description :

This plugin attempts to determine the type and the version of
the remote web server.

Risk factor :

None

Plugin output :

The remote web server type is :

MiniServ/0.01

Nessus ID : 10107
Informational ntp-gps-data (12321/tcp)
Synopsis :

An administration service is running on the remote host.

Description :

The remote server is running Webmin, a web-based interface for
system administration for Unix.

See also :

http://www.webmin.net/

Solution:

Stop the Webmin service if not needed or ensure access is limited to
authorized hosts. See the menu items '[Webmin Configuration][IP
Access Control]' and/or '[Webmin Configuration][Port and Address]'.

Risk factor :

None
Nessus ID : 10757
Informational ntp-gps-data (12321/tcp) Synopsis :

An SSL detection issue might impede the Nessus Scan.

Description :

Nessus has discovered that it is talking in plain HTTP on a SSL port.

Nessus has corrected this issue by enabling HTTPS for this port only.
However if other SSL ports are used on the remote host, they might be
skipped.

Solution :

Enable SSL tests in the 'Services' preference setting, or increase the
timeouts if this option is already set and the plugin missed this
port.

Risk factor :

None
Nessus ID : 15588
Informational ntp-gps-data (12321/tcp) A web server is running on this port.
Nessus ID : 22964
Warning https (443/tcp) Synopsis :

Debugging functions are enabled on the remote web server.

Description :

The remote webserver supports the TRACE and/or TRACK methods. TRACE
and TRACK are HTTP methods which are used to debug web server
connections.

In addition, it has been shown that servers supporting the TRACE
method are subject to cross-site scripting attacks, dubbed XST for
"Cross-Site Tracing", when used in conjunction with various weaknesses
in browsers. An attacker may use this flaw to trick your legitimate
web users to give him their credentials.

See also :

http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf
http://www.apacheweek.com/issues/03-01-24
http://www.kb.cert.org/vuls/id/288308
http://www.kb.cert.org/vuls/id/867593

Solution :

Disable these methods.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Solution :

Add the following lines for each virtual host in your configuration file :

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Plugin output :

Nessus sent the following TRACE request :

------------------------------ snip ------------------------------
TRACE /Nessus946181596.html HTTP/1.1
Connection: Close
Host: 192-168-1-115.tpgi.com.au
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Thu, 02 Jul 2009 02:35:25 GMT
Server: Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus946181596.html HTTP/1.1
Connection: Keep-Alive
Host: 192-168-1-115.tpgi.com.au
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

CVE : CVE-2003-1567, CVE-2004-2320
BID : 9506, 9561, 11604, 33374
Other references : OSVDB:877, OSVDB:3726, OSVDB:5648
Nessus ID : 11213
Warning https (443/tcp) Synopsis :

The remote service supports the use of weak SSL ciphers.

Description :

The remote host supports the use of SSL ciphers that offer either weak
encryption or no encryption at all.

See also :

http://www.openssl.org/docs/apps/ciphers.html

Solution :

Reconfigure the affected application if possible to avoid use of weak
ciphers.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Plugin output :

Here is the list of weak SSL ciphers supported by the remote server :

Low Strength Ciphers (< 56-bit key)
SSLv2
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
SSLv3
EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
TLSv1
EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

Nessus ID : 26928
Warning https (443/tcp)
Synopsis :

The remote service encrypts traffic using a protocol with known
weaknesses.

Description :

The remote service accepts connections encrypted using SSL 2.0, which
reportedly suffers from several cryptographic flaws and has been
deprecated for several years. An attacker may be able to exploit
these issues to conduct man-in-the-middle attacks or decrypt
communications between the affected service and clients.

See also :

http://www.schneier.com/paper-ssl.pdf

Solution :

Consult the application's documentation to disable SSL 2.0 and use SSL
3.0 or TLS 1.0 instead.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Nessus ID : 20007
Informational https (443/tcp)
Synopsis :

Security patches are backported.

Description :

Security patches may have been 'back ported' to the remote HTTP server
without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Solution :

Give Nessus credentials to perform local checks.

Risk factor :

None

Nessus ID : 39521
Informational https (443/tcp)
Synopsis :

Some information about the remote HTTP configuration can be extracted.

Description :

This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
etc...

This test is informational only and does not denote any security
problem.

Risk factor :

None

Plugin output :

Protocol version : HTTP/1.1
SSL : yes
Pipelining : yes
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :

Date: Thu, 02 Jul 2009 02:35:22 GMT
Server: Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g
X-Powered-By: PHP/5.2.4-2ubuntu5.5
Set-Cookie: SESS0b00863a7c0fb494cb5cf8436b14bf1b=1e66bded59b899c424a6722102d4c744; expires=Sat, 25 Jul 2009 06:08:42 GMT; path=/; domain=.192-168-1-115.tpgi.com.au
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 02 Jul 2009 02:35:22 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=utf-8

Nessus ID : 24260
Informational https (443/tcp)
Synopsis :

The remote web server contains a 'robots.txt' file.

Description :

The remote host contains a file named 'robots.txt' that is intended to
prevent web 'robots' from visiting certain directories in a web site for
maintenance or indexing purposes. A malicious user may also be able to
use the contents of this file to learn of sensitive documents or
directories on the affected site and either retrieve them directly or
target them for other attacks.

See also :

http://www.robotstxt.org/wc/exclusion.html

Solution :

Review the contents of the site's robots.txt file, use Robots META tags
instead of entries in the robots.txt file, and/or adjust the web
server's access controls to limit access to sensitive material.

Risk factor :

None

Contents of robots.txt :

# $Id: robots.txt,v 1.7.2.3 2008/12/10 20:24:38 drumm Exp $
#
# robots.txt
#
# This file is to prevent the crawling and indexing of certain parts
# of your site by web crawlers and spiders run by sites like Yahoo!
# and Google. By telling these "robots" where not to go on your site,
# you save bandwidth and server resources.
#
# This file will be ignored unless it is at the root of your host:
# Used: http://example.com/robots.txt
# Ignored: http://example.com/site/robots.txt
#
# For more information about the robots.txt standard, see:
# http://www.robotstxt.org/wc/robots.html
#
# For syntax checking, see:
# http://www.sxw.org.uk/computing/robots/check.html

User-agent: *
Crawl-delay: 10
# Directories
Disallow: /includes/
Disallow: /misc/
Disallow: /modules/
Disallow: /profiles/
Disallow: /scripts/
Disallow: /sites/
Disallow: /themes/
# Files
Disallow: /CHANGELOG.txt
Disallow: /cron.php
Disallow: /INSTALL.mysql.txt
Disallow: /INSTALL.pgsql.txt
Disallow: /install.php
Disallow: /INSTALL.txt
Disallow: /LICENSE.txt
Disallow: /MAINTAINERS.txt
Disallow: /update.php
Disallow: /UPGRADE.txt
Disallow: /xmlrpc.php
# Paths (clean URLs)
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /contact/
Disallow: /logout/
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register/
Disallow: /user/password/
Disallow: /user/login/
# Paths (no clean URLs)
Disallow: /?q=admin/
Disallow: /?q=comment/reply/
Disallow: /?q=contact/
Disallow: /?q=logout/
Disallow: /?q=node/add/
Disallow: /?q=search/
Disallow: /?q=user/password/
Disallow: /?q=user/register/
Disallow: /?q=user/login/

Other references : OSVDB:238
Nessus ID : 10302
Informational https (443/tcp)
Synopsis :

A web server is running on the remote host.

Description :

This plugin attempts to determine the type and the version of
the remote web server.

Risk factor :

None

Plugin output :

The remote web server type is :

Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g


Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
Nessus ID : 10107
Informational https (443/tcp)
Synopsis :

The remote service encrypts communications using SSL.

Description :

This script detects which SSL ciphers are supported by the remote
service for encrypting communications.

See also :

http://www.openssl.org/docs/apps/ciphers.html

Risk factor :

None

Plugin output :

Here is the list of SSL ciphers supported by the remote server :

Low Strength Ciphers (< 56-bit key)
SSLv2
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
SSLv3
EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export
TLSv1
EXP-EDH-RSA-DES-CBC-SHA Kx=DH(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-DES-CBC-SHA Kx=RSA(512) Au=RSA Enc=DES(40) Mac=SHA1 export
EXP-RC2-CBC-MD5 Kx=RSA(512) Au=RSA Enc=RC2(40) Mac=MD5 export
EXP-RC4-MD5 Kx=RSA(512) Au=RSA Enc=RC4(40) Mac=MD5 export

Medium Strength Ciphers (>= 56-bit and < 112-bit key)
SSLv2
DES-CBC-MD5 Kx=RSA Au=RSA Enc=DES(56) Mac=MD5
SSLv3
EDH-RSA-DES-CBC-SHA Kx=DH Au=RSA Enc=DES(56) Mac=SHA1
DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1
TLSv1
EDH-RSA-DES-CBC-SHA Kx=DH Au=RSA Enc=DES(56) Mac=SHA1
DES-CBC-SHA Kx=RSA Au=RSA Enc=DES(56) Mac=SHA1

High Strength Ciphers (>= 112-bit key)
SSLv2
DES-CBC3-MD5 Kx=RSA Au=RSA Enc=3DES(168) Mac=MD5
RC2-CBC-MD5 Kx=RSA Au=RSA Enc=RC2(128) Mac=MD5
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
SSLv3
EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1
TLSv1
EDH-RSA-DES-CBC3-SHA Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1
DHE-RSA-AES128-SHA Kx=DH Au=RSA Enc=AES(128) Mac=SHA1
DHE-RSA-AES256-SHA Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
DES-CBC3-SHA Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1
AES128-SHA Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1
AES256-SHA Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1
RC4-MD5 Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5
RC4-SHA Kx=RSA Au=RSA Enc=RC4(128) Mac=SHA1

The fields above are :

{OpenSSL ciphername}
Kx={key exchange}
Au={authentication}
Enc={symmetric encryption method}
Mac={message authentication code}
{export flag}

Nessus ID : 21643
Informational https (443/tcp) Synopsis :

This plugin displays the SSL certificate.

Description :

This plugin connects to every SSL-related port and attempts to
extract and dump the X.509 certificate.

Risk factor :

None

Plugin output :

Subject Name:

Organization: TurnKey Linux
Organization Unit: Software appliances

Issuer Name:

Organization: TurnKey Linux
Organization Unit: Software appliances

Serial Number: 00 AE 04 54 7C F3 DD 37 40

Version: 3

Signature Algorithm: SHA-1 With RSA Encryption

Not Valid Before: Dec 17 18:41:21 2008 GMT
Not Valid After: Dec 15 18:41:21 2018 GMT

Public Key Info:

Algorithm: RSA Encryption
Public Key: 00 BA 7E 9D 56 56 59 F5 6F 51 E4 26 58 40 79 EA AE E2 65 11
A7 E1 5E 84 63 AF 5E FA 68 D6 DA AA DA 52 17 82 3B CB B6 35
CD 03 07 16 73 42 13 7A EB 0D 50 43 6A BE 42 CF 85 7E 9A F5
EF 52 C7 B3 51
Exponent: 01 00 01

Signature: 00 22 55 CA E4 64 07 F2 41 D0 07 A6 06 24 EE 92 F4 06 0C 4B
EB 25 23 3C 99 AD 05 3A 34 2C 17 B1 D5 E4 A5 C9 FD B6 F0 FF
79 95 C0 34 DF 86 CF E7 A5 6F 28 9A AC 91 42 B5 DA 0D 51 12
C0 85 3C 6D 80

Extension: Subject Key Identifier (2.5.29.14)
Critical: 0
Subject Key Identifier: 4C 50 91 92 CA 1D FD A8 8E 81 BC 38 54 06 E5 30 EC EB 12 2F


Extension: Authority Key Identifier (2.5.29.35)
Critical: 0


Extension: Basic Constraints (2.5.29.19)
Critical: 0
Data: 30 03 01 01 FF

Nessus ID : 10863
Informational https (443/tcp) A web server is running on this port through SSLv2.
Nessus ID : 22964
Informational https (443/tcp) An SSLv2 server answered on this port.

Nessus ID : 22964
Warning http (80/tcp) Synopsis :

Debugging functions are enabled on the remote web server.

Description :

The remote webserver supports the TRACE and/or TRACK methods. TRACE
and TRACK are HTTP methods which are used to debug web server
connections.

In addition, it has been shown that servers supporting the TRACE
method are subject to cross-site scripting attacks, dubbed XST for
"Cross-Site Tracing", when used in conjunction with various weaknesses
in browsers. An attacker may use this flaw to trick your legitimate
web users to give him their credentials.

See also :

http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf
http://www.apacheweek.com/issues/03-01-24
http://www.kb.cert.org/vuls/id/288308
http://www.kb.cert.org/vuls/id/867593

Solution :

Disable these methods.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
Solution :

Add the following lines for each virtual host in your configuration file :

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

Alternatively, note that Apache versions 1.3.34, 2.0.55, and 2.2
support disabling the TRACE method natively via the 'TraceEnable'
directive.

Plugin output :

Nessus sent the following TRACE request :

------------------------------ snip ------------------------------
TRACE /Nessus751519483.html HTTP/1.1
Connection: Close
Host: 192-168-1-115.tpgi.com.au
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Date: Thu, 02 Jul 2009 02:35:25 GMT
Server: Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g
Connection: close
Transfer-Encoding: chunked
Content-Type: message/http


TRACE /Nessus751519483.html HTTP/1.1
Connection: Close
Host: 192-168-1-115.tpgi.com.au
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

CVE : CVE-2003-1567, CVE-2004-2320
BID : 9506, 9561, 11604, 33374
Other references : OSVDB:877, OSVDB:3726, OSVDB:5648
Nessus ID : 11213
Informational http (80/tcp)
Synopsis :

Security patches are backported.

Description :

Security patches may have been 'back ported' to the remote HTTP server
without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Solution :

Give Nessus credentials to perform local checks.

Risk factor :

None

Nessus ID : 39521
Informational http (80/tcp)
Synopsis :

Some information about the remote HTTP configuration can be extracted.

Description :

This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
etc...

This test is informational only and does not denote any security
problem.

Risk factor :

None

Plugin output :

Protocol version : HTTP/1.1
SSL : no
Pipelining : yes
Keep-Alive : yes
Options allowed : (Not implemented)
Headers :

Date: Thu, 02 Jul 2009 02:35:22 GMT
Server: Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g
X-Powered-By: PHP/5.2.4-2ubuntu5.5
Set-Cookie: SESS0b00863a7c0fb494cb5cf8436b14bf1b=c933eb89b32c95fc0239288ff5902ff0; expires=Sat, 25 Jul 2009 06:08:42 GMT; path=/; domain=.192-168-1-115.tpgi.com.au
Expires: Sun, 19 Nov 1978 05:00:00 GMT
Last-Modified: Thu, 02 Jul 2009 02:35:22 GMT
Cache-Control: store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=utf-8

Nessus ID : 24260
Informational http (80/tcp)
Synopsis :

The remote web server contains a 'robots.txt' file.

Description :

The remote host contains a file named 'robots.txt' that is intended to
prevent web 'robots' from visiting certain directories in a web site for
maintenance or indexing purposes. A malicious user may also be able to
use the contents of this file to learn of sensitive documents or
directories on the affected site and either retrieve them directly or
target them for other attacks.

See also :

http://www.robotstxt.org/wc/exclusion.html

Solution :

Review the contents of the site's robots.txt file, use Robots META tags
instead of entries in the robots.txt file, and/or adjust the web
server's access controls to limit access to sensitive material.

Risk factor :

None

Contents of robots.txt :

# $Id: robots.txt,v 1.7.2.3 2008/12/10 20:24:38 drumm Exp $
#
# robots.txt
#
# This file is to prevent the crawling and indexing of certain parts
# of your site by web crawlers and spiders run by sites like Yahoo!
# and Google. By telling these "robots" where not to go on your site,
# you save bandwidth and server resources.
#
# This file will be ignored unless it is at the root of your host:
# Used: http://example.com/robots.txt
# Ignored: http://example.com/site/robots.txt
#
# For more information about the robots.txt standard, see:
# http://www.robotstxt.org/wc/robots.html
#
# For syntax checking, see:
# http://www.sxw.org.uk/computing/robots/check.html

User-agent: *
Crawl-delay: 10
# Directories
Disallow: /includes/
Disallow: /misc/
Disallow: /modules/
Disallow: /profiles/
Disallow: /scripts/
Disallow: /sites/
Disallow: /themes/
# Files
Disallow: /CHANGELOG.txt
Disallow: /cron.php
Disallow: /INSTALL.mysql.txt
Disallow: /INSTALL.pgsql.txt
Disallow: /install.php
Disallow: /INSTALL.txt
Disallow: /LICENSE.txt
Disallow: /MAINTAINERS.txt
Disallow: /update.php
Disallow: /UPGRADE.txt
Disallow: /xmlrpc.php
# Paths (clean URLs)
Disallow: /admin/
Disallow: /comment/reply/
Disallow: /contact/
Disallow: /logout/
Disallow: /node/add/
Disallow: /search/
Disallow: /user/register/
Disallow: /user/password/
Disallow: /user/login/
# Paths (no clean URLs)
Disallow: /?q=admin/
Disallow: /?q=comment/reply/
Disallow: /?q=contact/
Disallow: /?q=logout/
Disallow: /?q=node/add/
Disallow: /?q=search/
Disallow: /?q=user/password/
Disallow: /?q=user/register/
Disallow: /?q=user/login/

Other references : OSVDB:238
Nessus ID : 10302
Informational http (80/tcp)
Synopsis :

A web server is running on the remote host.

Description :

This plugin attempts to determine the type and the version of
the remote web server.

Risk factor :

None

Plugin output :

The remote web server type is :

Apache/2.2.8 (Ubuntu) PHP/5.2.4-2ubuntu5.5 with Suhosin-Patch mod_ssl/2.2.8 OpenSSL/0.9.8g


Solution : You can set the directive 'ServerTokens Prod' to limit
the information emanating from the server in its response headers.
Nessus ID : 10107
Informational http (80/tcp) A web server is running on this port.
Nessus ID : 22964
Informational ssh (22/tcp)
Synopsis :

Security patches are backported.

Description :

Security patches may have been 'back ported' to the remote SSH server
without changing its version number.

Banner-based checks have been disabled to avoid false positives.

Solution :

Give Nessus credentials to perform local checks.

Risk factor :

None

Nessus ID : 39520
Informational ssh (22/tcp)
Synopsis :

An SSH server is running on the remote host.

Description :

This plugin determines the versions of the SSH protocol supported by
the remote SSH daemon.

Risk factor :

None

Plugin output :

The remote SSH daemon supports the following versions of the
SSH protocol :

- 1.99
- 2.0


SSHv2 host key fingerprint : 79:29:e4:fa:9c:91:65:09:47:38:af:80:e2:48:30:a0

Nessus ID : 10881
Informational ssh (22/tcp) Synopsis :

An SSH server is listening on this port.

Description :

It is possible to obtain information about the remote SSH
server by sending an empty authentication request.

Risk factor :

None

Plugin output :

SSH version : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1.2

Nessus ID : 10267
Informational ssh (22/tcp) An SSH server is running on this port.
Nessus ID : 22964
[ return to top ]


Analysis of Host
Address of Host Port/Service Issue regarding Port
192.168.1.110 epmap (135/udp) Security hole found
192.168.1.110 general/udp Security notes found
192.168.1.110 general/icmp Security warning(s) found
192.168.1.110 general/tcp Security notes found
192.168.1.110 tip2 (3372/tcp) Security notes found
192.168.1.110 https (443/tcp) No Information
192.168.1.110 http (80/tcp) Security hole found
192.168.1.110 smtp (25/tcp) Security hole found
192.168.1.110 netbios-ssn (139/tcp) Security notes found
192.168.1.110 netbios-ns (137/udp) Security notes found
192.168.1.110 ms-lsa (1028/udp) Security notes found
192.168.1.110 iad1 (1030/udp) Security notes found
192.168.1.110 blackjack (1025/tcp) Security hole found
192.168.1.110 exosee (1027/tcp) Security notes found
192.168.1.110 cap (1026/tcp) Security hole found
192.168.1.110 microsoft-ds (445/tcp) Security hole found
192.168.1.110 epmap (135/tcp) Security hole found


Security Issues and Fixes: 192.168.1.110
Type Port Issue and Fix
Vulnerability epmap (135/udp)
A security vulnerability exists in the Messenger Service that could allow
arbitrary code execution on an affected system. An attacker who successfully
exploited this vulnerability could be able to run code with Local System
privileges on an affected system, or could cause the Messenger Service to fail.
Disabling the Messenger Service will prevent the possibility of attack.

This plugin actually checked for the presence of this flaw.

Solution : see http://www.microsoft.com/technet/security/bulletin/ms03-043.mspx

Risk factor : High

CVE : CVE-2003-0717
BID : 8826
Other references : IAVA:2003-A-0028, IAVA:2003-a-0017, IAVA:2003-b-0007, OSVDB:10936
Nessus ID : 11890
Informational general/udp For your information, here is the traceroute from 192.168.1.106 to 192.168.1.110 :
192.168.1.106
192.168.1.110

Nessus ID : 10287
Warning general/icmp
Synopsis :

The remote host leaks memory in network packets.

Description :

The remote host is vulnerable to an 'Etherleak' - the remote ethernet
driver seems to leak bits of the content of the memory of the remote
operating system.

Note that an attacker may take advantage of this flaw only when its
target is on the same physical subnet.

See also :

http://www.atstake.com/research/advisories/2003/a010603-1.txt

Solution :

Contact your vendor for a fix

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE : CVE-2003-0001
BID : 6535
Other references : OSVDB:3873
Nessus ID : 11197
Informational general/icmp
Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date which is set on your machine.

This may help him to defeat all your time based authentication
protocols.

Solution :

Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None

Plugin output :

The ICMP timestamps seem to be in little endian format (not in network format)
The difference between the local and remote clocks is -19 seconds.

CVE : CVE-1999-0524
Nessus ID : 10114
Informational general/tcp Information about this scan :

Nessus version : 4.0.1
Plugin feed version : 200906301334
Type of plugin feed : HomeFeed (Non-commercial use only)
Scanner IP : 192.168.1.106
Port scanner(s) : nessus_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Optimize the test : yes
CGI scanning : disabled
Web application tests : disabled
Max hosts : 20
Max checks : 4
Recv timeout : 5
Backports : None
Scan Start Date : 2009/7/2 12:33
Scan duration : 61 sec

Nessus ID : 19506
Informational general/tcp
Remote operating system : Microsoft Windows 2000 Server Service Pack 0
Confidence Level : 99
Method : MSRPC


The remote host is running Microsoft Windows 2000 Server Service Pack 0
Nessus ID : 11936
Informational general/tcp
Synopsis :

The manufacturer can be deduced from the Ethernet OUI.

Description :

Each ethernet MAC address starts with a 24-bit 'Organizationally
Unique Identifier'.
These OUI are registered by IEEE.

See also :

http://standards.ieee.org/faqs/OUI.html
http://standards.ieee.org/regauth/oui/index.shtml

Risk factor :

None

Plugin output :

The following card manufacturers were identified :

00:0c:29:64:44:7b : VMware, Inc.

Nessus ID : 35716
Informational general/tcp Synopsis :

The remote host seems to be a VMware virtual machine.

Description :

According to the MAC address of its network adapter, the remote host
is a VMware virtual machine.

Since it is physically accessible through the network, ensure that its
configuration matches your organization's security policy.

Risk factor :

None
Nessus ID : 20094
Informational general/tcp 192.168.1.110 resolves as 192-168-1-110.tpgi.com.au.
Nessus ID : 12053
Informational general/tcp Synopsis :

At least one local user has never logged in to his / her account.

Description :

Using the supplied credentials, it is possible to list local users who
have never logged into their accounts.

Solution :

Delete accounts that are not needed.

Risk factor :

None

Plugin output :

The following local users have never logged in :

- Guest
- TsInternetUser

Other references : OSVDB:754
Nessus ID : 10915
Informational general/tcp Synopsis :

At least one local user account has been disabled.

Description :

Using the supplied credentials, it is possible to list local user
accounts that have been disabled.

Solution :

Delete accounts that are no longer needed.

Risk factor :

None

Plugin output :

The following local user account has been disabled :

- Guest

Other references : OSVDB:752
Nessus ID : 10913
Informational general/tcp Synopsis :

At least one local user has a password that never expires.

Description :

Using the supplied credentials, it is possible to list local users
whose passwords never expire.

Solution :

Allow / require users to change their passwords regularly.

Risk factor :

None

Plugin output :

The following local users have passwords that never expire :

- Administrator
- Guest
- TsInternetUser
- IUSR_TRAINING1
- IWAM_TRAINING1

Other references : OSVDB:755
Nessus ID : 10916
Informational general/tcp Synopsis :

There is at least one user in the 'Administrators' group.

Description :

Using the supplied credentials, it is possible to extract the member
list of the 'Administrators' group. Members of this group have
complete access to the remote system.

Solution :

Verify that each member of the group should have this type of access.

Risk factor :

None

Plugin output :

The following user is a member of the 'Administrators' group :

- TRAINING1\Administrator (User)

Nessus ID : 10902
Informational tip2 (3372/tcp)
Synopsis :

There is an unknown service running on the remote host.

Description :

Nessus was unable to identify a service on the remote host even though
it returned a banner of some type.

Solution :

N/A

Risk factor :

None

Plugin output :

If you know what this service is, please send a description along
with the following output to [email protected] :

Port : 3372
Type : get_http
Banner :
0x00: 45 52 52 4F 52 0A ERROR.

Nessus ID : 11154
Vulnerability http (80/tcp)
Synopsis :

Arbitrary code can be execute on the remote host thru IIS

Description :

The remote version of the IIS web server contains a bug
which might be used by an attacker to execute arbitrary
code on the remote system.

To exploit this vulnerability, an attacker would need to
send a specially malformed HTTP/1.1 request to the remote
host containing an offensive payload.

Solution:

http://www.microsoft.com/technet/security/bulletin/ms01-023.mspx

See also :

http://www.eeye.com/html/Research/Advisories/AD20010501.html

Risk factor :
Critical / CVSS Base Score : 10
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2001-0241
BID : 2674
Other references : IAVA:2001-a-0005, OSVDB:3323
Nessus ID : 10657
Vulnerability http (80/tcp)
There's a buffer overflow in the remote web server through
the ISAPI filter.

It is possible to overflow the remote web server and execute
commands as user SYSTEM.

Additionally, other vulnerabilities exist in the remote web
server since it has not been patched.

Solution: See http://www.microsoft.com/technet/security/bulletin/ms01-044.mspx
Risk factor : High

CVE : CVE-2001-0544, CVE-2001-0545, CVE-2001-0506, CVE-2001-0507, CVE-2001-0508, CVE-2001-0500
BID : 2690, 2880, 3190, 3193, 3194, 3195
Other references : IAVA:2001-a-0008, IAVA:2001-a-0010
Nessus ID : 10685
Vulnerability http (80/tcp)
Synopsis :

Arbitary commands can be executed on the remote web server

Description :

When IIS receives a user request to run a script, it renders
the request in a decoded canonical form, then performs
security checks on the decoded request. A vulnerability
results because a second, superfluous decoding pass is
performed after the initial security checks are completed.
Thus, a specially crafted request could allow an attacker to
execute arbitrary commands on the IIS Server.


Solution :

http://www.microsoft.com/technet/security/bulletin/ms01-026.mspx
http://www.microsoft.com/technet/security/bulletin/ms01-044.mspx

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Plugin output :

Requesting
http://192-168-1-110.tpgi.com.au/scripts/..%255c..%255c..%255c..%255c..%255c../winnt/system32/cmd.exe?/c+dir+c:\+/OG
produces :

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 02 Jul 2009 02:34:35 GMT
Connection: close
Content-Type: application/octet-stream
Volume in drive C has no label.
Volume Serial Number is 6CA7-AB3F


Directory of c:\

02/23/2004 11:48p <DIR> Inetpub
02/23/2004 11:51p <DIR> Program Files
02/24/2004 05:41p <DIR> WINNT
02/24/2004 12:16a <DIR> Documents and Settings
0 File(s) 0 bytes
4 Dir(s) 2,951,999,488 bytes free

CVE : CVE-2001-0333, CVE-2001-0507
BID : 2708, 3193
Other references : IAVA:2001-a-0006, OSVDB:5736
Nessus ID : 10671
Vulnerability http (80/tcp)
The IIS server appears to have the .HTR ISAPI filter mapped.

At least one remote vulnerability has been discovered for the .HTR
filter. This is detailed in Microsoft Advisory
MS02-018, and gives remote SYSTEM level access to the web server.

It is recommended that, even if you have patched this vulnerability,
you unmap the .HTR extension and any other unused ISAPI extensions
if they are not required for the operation of your site.

Solution :
To unmap the .HTR extension:
1.Open Internet Services Manager.
2.Right-click the Web server choose Properties from the context menu.
3.Master Properties
4.Select WWW Service -> Edit -> HomeDirectory -> Configuration
and remove the reference to .htr from the list.

In addition, you may wish to download and install URLSCAN from the
Microsoft Technet Website. URLSCAN, by default, blocks all requests
for .htr files.

Risk factor : High

CVE : CVE-2002-0071
BID : 4474
Other references : IAVA:2002-A-0002, OSVDB:3325
Nessus ID : 10932
Vulnerability http (80/tcp) Synopsis :

Arbitrary code can be executed on the remote host.

Description :

The hotfix for the 'Webserver file request parsing' problem
has not been applied.

This vulnerability can allow an attacker to make the remote
IIS server make execute arbitrary commands.

Solution :

http://www.microsoft.com/technet/security/bulletin/ms00-086.mspx
http://www.microsoft.com/technet/security/bulletin/ms00-078.mspx (superseded)

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2000-0884
BID : 1806
Other references : IAVA:2000-a-0005, OSVDB:436
Nessus ID : 10537
Warning http (80/tcp)
Synopsis :

The remote web server is affected by an information disclosure flaw.

Description :

There is a serious vulnerability in Windows 2000 (unpatched by SP1)
that allows an attacker to view ASP/ASA source code instead of a
processed file. SP source code can contain sensitive information such
as usernames and passwords for ODBC connections.

See also :

http://www.microsoft.com/technet/security/bulletin/MS00-058.asp

Solution :

Install Windows 2000 Service Pack 1 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE : CVE-2000-0778
BID : 1578
Other references : OSVDB:390
Nessus ID : 10491
Warning http (80/tcp)
Synopsis :

The remote web server is vulnerable to a cross-site scripting attack.

Description :

The remote web server is running with Front Page extensions. The
remote version of the FrontPage extensions are vulnerable to a cross-
site scripting issue when the CGI /_vti_bin/shtml.dll is provided with
improper parameters.

Solution :

http://www.microsoft.com/technet/security/bulletin/ms00-060.mspx

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE : CVE-2000-0746
BID : 1594, 1595
Other references : OSVDB:9199
Nessus ID : 11395
Warning http (80/tcp) Synopsis :

Debugging functions are enabled on the remote web server.

Description :

The remote webserver supports the TRACE and/or TRACK methods. TRACE
and TRACK are HTTP methods which are used to debug web server
connections.

In addition, it has been shown that servers supporting the TRACE
method are subject to cross-site scripting attacks, dubbed XST for
"Cross-Site Tracing", when used in conjunction with various weaknesses
in browsers. An attacker may use this flaw to trick your legitimate
web users to give him their credentials.

See also :

http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf
http://www.apacheweek.com/issues/03-01-24
http://www.kb.cert.org/vuls/id/288308
http://www.kb.cert.org/vuls/id/867593

Solution :

Disable these methods.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Solution :

Use the URLScan tool to deny HTTP TRACE requests or to permit only the
methods needed to meet site requirements and policy.

Plugin output :

Nessus sent the following TRACE request :

------------------------------ snip ------------------------------
TRACE /Nessus1442500379.html HTTP/1.1
Connection: Close
Host: 192-168-1-110.tpgi.com.au
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

and received the following response from the remote server :

------------------------------ snip ------------------------------
HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Thu, 02 Jul 2009 02:34:35 GMT
Connection: close
Content-Type: message/http
Content-Length: 309


TRACE /Nessus1442500379.html HTTP/1.1
Connection: Close
Host: 192-168-1-110.tpgi.com.au
Pragma: no-cache
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, image/png, */*
Accept-Language: en
Accept-Charset: iso-8859-1,*,utf-8

------------------------------ snip ------------------------------

CVE : CVE-2003-1567, CVE-2004-2320
BID : 9506, 9561, 11604, 33374
Other references : OSVDB:877, OSVDB:3726, OSVDB:5648
Nessus ID : 11213
Warning http (80/tcp)
Synopsis :

The remote IIS web server is missing a security patch.

Description :

The remote version of IIS is vulnerable to two vulnerabilities :

- An information disclosure issue allows a remote attacker to obtain
the real pathname of the document root by requesting nonexistent
files with .ida or .idq extensions.

- An argument validation issue in the WebHits component lets a remote
attacker read abitrary files on the remote server

The path disclosure issue has been reported to affect Microsoft Index
Server as well.

Solution :

Microsoft released a patch for Windows 2000 :

http://www.microsoft.com/technet/security/bulletin/ms00-006.mspx

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVE : CVE-2000-0071, CVE-2000-0098, CVE-2000-0302
BID : 1065
Other references : OSVDB:391
Nessus ID : 10492
Informational http (80/tcp)
Synopsis :

Some information about the remote HTTP configuration can be extracted.

Description :

This test gives some information about the remote HTTP protocol - the
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
etc...

This test is informational only and does not denote any security
problem.

Risk factor :

None

Plugin output :

Protocol version : HTTP/1.1
SSL : no
Pipelining : yes
Keep-Alive : no
Options allowed : OPTIONS, TRACE, GET, HEAD, DELETE, PUT, POST, COPY, MOVE, MKCOL, PROPFIND, PROPPATCH, LOCK, UNLOCK, SEARCH
Headers :

Server: Microsoft-IIS/5.0
Date: Thu, 02 Jul 2009 02:34:35 GMT
Content-Length: 1270
Content-Type: text/html
Set-Cookie: ASPSESSIONIDQGGGQIEK=KEFDGKACAONLFFGOPBEGCDKB; path=/
Cache-control: private

Nessus ID : 24260
Informational http (80/tcp)
Synopsis :

The remote server is running with WebDAV enabled.

Description :

WebDAV is an industry standard extension to the HTTP specification.
It adds a capability for authorized users to remotely add and manage
the content of a web server.

If you do not use this extension, you should disable it.

Solution :

http://support.microsoft.com/default.aspx?kbid=241520

Risk factor :

None

Nessus ID : 11424
Informational http (80/tcp)
Synopsis :

Indexing Service filter is enabled on the remote Web server.

Description :

The IIS server appears to have the .IDA ISAPI filter mapped.

At least one remote vulnerability has been discovered for the .IDA
(indexing service) filter. This is detailed in Microsoft Advisory
MS01-033, and gives remote SYSTEM level access to the web server.

It is recommended that even if you have patched this vulnerability that
you unmap the .IDA extension, and any other unused ISAPI extensions
if they are not required for the operation of your site.

Solution :

To unmap the .IDA extension:
1.Open Internet Services Manager.
2.Right-click the Web server choose Properties from the context menu.
3.Master Properties
4.Select WWW Service -> Edit -> HomeDirectory -> Configuration
5.Remove the reference to .ida from the list.

In addition, you may wish to download and install URLSCAN from the
Microsoft Technet web site. URLSCAN, by default, blocks all .ida
requests to the IIS server.

Risk factor :

None
Nessus ID : 10695
Informational http (80/tcp)
Synopsis :

Remote Web server supports Internet Printing Protocol

Description :

IIS 5 has support for the Internet Printing Protocol(IPP), which is
enabled in a default install. The protocol is implemented in IIS5 as an
ISAPI extension. At least one security problem (a buffer overflow)
has been found with that extension in the past, so we recommend
you disable it if you do not use this functionality.

See also :

http://www.cert.org/advisories/CA-2001-10.html

Solution :

To unmap the .printer extension:
1.Open Internet Services Manager.
2.Right-click the Web server choose Properties from the context menu.
3.Master Properties
4.Select WWW Service -> Edit -> HomeDirectory -> Configuration
and remove the reference to .printer from the list.

Risk factor :

None
Nessus ID : 10661
Informational http (80/tcp)
Synopsis :

The remote web server is running Microsoft IIS.

Description :

The Patch level (Service Pack) of the remote IIS server appears to be
lower than the current IIS service pack level. As each service pack
typically contains many security patches, the server may be at risk.

Note that this test makes assumptions of the remote patch level based
on static return values (Content-Length) within a IIS Server's 404
error message. As such, the test can not be totally reliable and
should be manually confirmed.

Note also that, to determine IIS6 patch levels, a simple test is done
based on strict RFC 2616 compliance. It appears as if IIS6-SP1 will
accept CR as an end-of-line marker instead of both CR and LF.

Solution :

Ensure that the server is running the latest stable Service Pack.

Risk factor :

None

Plugin output :

The remote IIS server *seems* to be Microsoft IIS 5 - SP0 or SP1

Nessus ID : 11874
Informational http (80/tcp)
Synopsis :

A web server is running on the remote host.

Description :

This plugin attempts to determine the type and the version of
the remote web server.

Risk factor :

None

Plugin output :

The remote web server type is :

Microsoft-IIS/5.0

Nessus ID : 10107
Informational http (80/tcp)
Synopsis :

The remote web server is not configured or is not properly configured.

Description :

The remote web server uses its default welcome page. It probably
means that this server is not used at all or is serving content that
is meant to be hidden.

Solution :

Disable this service if you do not use it.

Risk factor :

None

Other references : OSVDB:2117Nessus ID : 11422
Informational http (80/tcp) A web server is running on this port.
Nessus ID : 22964
Vulnerability smtp (25/tcp)
The remote Windows host has a ASN.1 library which is vulnerable to a
flaw which could allow an attacker to execute arbitrary code on this host.

To exploit this flaw, an attacker would need to send a specially crafted
ASN.1 encoded packet with improperly advertised lengths.

This particular check sent a malformed SMTP authorization packet and determined that
the remote host is not patched.

Solution : http://www.microsoft.com/technet/security/bulletin/ms04-007.mspx
Risk factor : High

CVE : CVE-2003-0818
BID : 9633, 9635, 9743, 13300
Other references : IAVA:2004-A-0001, OSVDB:3902
Nessus ID : 12065
Warning smtp (25/tcp)
It is possible to make the remote SMTP server fail
and restart by sending it malformed input.

The service will restart automatically, but all the connections
established at the time of the attack will be dropped.

An attacker may use this flaw to make mail delivery to your site
less efficient.


Solution : http://www.microsoft.com/technet/security/bulletin/MS02-012.mspx
Risk factor : Medium

CVE : CVE-2002-0055
BID : 4204
Nessus ID : 10885
Warning smtp (25/tcp)
It is possible to authenticate to the remote SMTP service
by logging in as a NULL session.

An attacker may use this flaw to use your SMTP server as a
spam relay.


Solution : http://www.microsoft.com/technet/security/bulletin/MS02-011.mspx
Risk factor : Medium

CVE : CVE-2002-0054
BID : 4205
Other references : OSVDB:5390, OSVDB:10247
Nessus ID : 11308
Warning smtp (25/tcp)
The remote SMTP server is vulnerable to a flaw in its authentication
process.

This vulnerability allows any unauthorized user to successfully
authenticate and use the remote SMTP server.

An attacker may use this flaw to use this SMTP server
as a spam relay.

Solution : see http://www.microsoft.com/technet/security/bulletin/ms01-037.mspx

Risk factor : High

CVE : CVE-2001-0504
BID : 2988
Nessus ID : 10703
Informational smtp (25/tcp)
Synopsis :

An SMTP server is listening on the remote port.

Description :

The remote host is running a mail (SMTP) server on this port.

Since SMTP servers are the targets of spammers, it is recommended you
disable it if you do not use it.

Solution :

Disable this service if you do not use it, or filter incoming traffic
to this port.

Risk factor :

None

Plugin output :

Remote SMTP server banner :

220 training1 Microsoft ESMTP MAIL Service, Version: 5.0.2172.1 ready at Thu, 2 Jul 2009 12:33:48 +1000

Nessus ID : 10263
Informational smtp (25/tcp) An SMTP server is running on this port.
Nessus ID : 22964
Informational netbios-ssn (139/tcp)
Synopsis :

A file / print sharing service is listening on the remote host.

Description :

The remote service understands the CIFS (Common Internet File System)
or Server Message Block (SMB) protocol, used to provide shared access
to files, printers, etc between nodes on a network.

Risk factor :

None

Plugin output :

An SMB server is running on this port.

Nessus ID : 11011
Informational netbios-ns (137/udp) Synopsis :

It is possible to obtain the network name of the remote host.

Description :

The remote host listens on udp port 137 and replies to NetBIOS nbtscan
requests. By sending a wildcard request it is possible to obtain the
name of the remote system and the name of its domain.

Risk factor :

None

Plugin output :

The following 5 NetBIOS names have been gathered :

TRAINING1 = Computer name
WORKGROUP = Workgroup / Domain name
TRAINING1 = File Server Service
WORKGROUP = Browser Service Elections
TRAINING1 = Messenger Service

The remote host has the following MAC address on its adapter :
00:0c:29:64:44:7b

Other references : OSVDB:13577Nessus ID : 10150
Informational ms-lsa (1028/udp)
Synopsis :

A DCE/RPC service is running on the remote host.

Description :

By sending a Lookup request to the portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing Environment
(DCE) services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port/pipe.

Solution :

N/A

Risk factor :

None

Plugin output :

The following DCERPC services are available on UDP port 1028 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bfa951d1-2f0e-11d3-bfd1-00c04fa3490a, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
UDP Port : 1028
IP : 192.168.1.110

Nessus ID : 10736
Informational iad1 (1030/udp)
Synopsis :

A DCE/RPC service is running on the remote host.

Description :

By sending a Lookup request to the portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing Environment
(DCE) services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port/pipe.

Solution :

N/A

Risk factor :

None

Plugin output :

The following DCERPC services are available on UDP port 1030 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5a7b91f8-ff00-11d0-a9b2-00c04fb6e6fc, version 1.0
Description : Messenger Service
Windows process : svchost.exe
Annotation : Messenger Service
Type : Remote RPC service
UDP Port : 1030
IP : 192.168.1.110

Nessus ID : 10736
Vulnerability blackjack (1025/tcp)
Synopsis :

A vulnerability in MSDTC could allow remote code execution.

Description :

The remote version of Windows contains a version of MSDTC (Microsoft Data
Transaction Coordinator) service which is vulnerable to several remote code
execution, local privilege escalation and denial of service vulnerabilities.

An attacker may exploit these flaws to obtain the complete control of the
remote host.

Solution :

Microsoft has released a set of patches for Windows 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms05-051.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2005-2119, CVE-2005-1978, CVE-2005-1979, CVE-2005-1980
BID : 15059, 15058, 15057, 15056
Other references : IAVA:2005-A-0030
Nessus ID : 20008
Vulnerability blackjack (1025/tcp)
Synopsis :

A vulnerability in MSDTC could allow remote code execution.

Description :

The remote version of Windows contains a version of MSDTC (Microsoft Data
Transaction Coordinator) service which is vulnerable to several remote code
execution and denial of service vulnerabilities.

An attacker may exploit these flaws to obtain the complete control of the
remote host (2000, NT4) or to crash the remote service (XP, 2003).

Solution :

Microsoft has released a set of patches for Windows 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms06-018.mspx

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE : CVE-2006-0034, CVE-2006-1184
BID : 17905, 17906
Other references : OSVDB:25335, OSVDB:25336
Nessus ID : 21334
Informational blackjack (1025/tcp)
Synopsis :

A DCE/RPC service is running on the remote host.

Description :

By sending a Lookup request to the portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing Environment
(DCE) services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port/pipe.

Solution :

N/A

Risk factor :

None

Plugin output :

The following DCERPC services are available on TCP port 1025 :

Object UUID : d0233e5c-4a70-407d-8eff-b174206cdec7
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Remote RPC service
TCP Port : 1025
IP : 192.168.1.110

Object UUID : 31315b11-60d1-4885-87f1-d281ca688101
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Remote RPC service
TCP Port : 1025
IP : 192.168.1.110

Object UUID : ee4f35ae-7ab1-45fa-9860-1e7f47962176
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Remote RPC service
TCP Port : 1025
IP : 192.168.1.110

Object UUID : 8195e9c8-5760-4f9d-870f-f9036a5cb5bf
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Remote RPC service
TCP Port : 1025
IP : 192.168.1.110

Nessus ID : 10736
Informational exosee (1027/tcp)
Synopsis :

A DCE/RPC service is running on the remote host.

Description :

By sending a Lookup request to the portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing Environment
(DCE) services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port/pipe.

Solution :

N/A

Risk factor :

None

Plugin output :

The following DCERPC services are available on TCP port 1027 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bfa951d1-2f0e-11d3-bfd1-00c04fa3490a, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
TCP Port : 1027
IP : 192.168.1.110

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 82ad4280-036b-11cf-972c-00aa006887b0, version 2.0
Description : Internet Information Service (IISAdmin)
Windows process : inetinfo.exe
Type : Remote RPC service
TCP Port : 1027
IP : 192.168.1.110

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8cfb5d70-31a4-11cf-a7d8-00805f48a135, version 3.0
Description : Internet Information Service (SMTP)
Windows process : inetinfo.exe
Type : Remote RPC service
TCP Port : 1027
IP : 192.168.1.110

Nessus ID : 10736
Vulnerability cap (1026/tcp)
Synopsis :

Arbitrary code can be executed on the remote host.

Description :

There is a flaw in the Task Scheduler application which could allow a
remote attacker to execute code remotely. There are many attack vectors
for this flaw. An attacker, exploiting this flaw, would need to either
have the ability to connect to the target machine or be able to coerce a
local user to either install a .job file or browse to a malicious website.

Solution :

Microsoft has released a set of patches for Windows 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms04-022.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2004-0212
BID : 10708
Other references : OSVDB:7798
Nessus ID : 13852
Informational cap (1026/tcp)
Synopsis :

A DCE/RPC service is running on the remote host.

Description :

By sending a Lookup request to the portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing Environment
(DCE) services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port/pipe.

Solution :

N/A

Risk factor :

None

Plugin output :

The following DCERPC services are available on TCP port 1026 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
TCP Port : 1026
IP : 192.168.1.110

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
TCP Port : 1026
IP : 192.168.1.110

Nessus ID : 10736
Vulnerability microsoft-ds (445/tcp)
The remote host is vulnerable to a denial of service attack in
its SMB stack.

An attacker may exploit this flaw to crash the remote host
remotely, without any kind of authentication.

Solution :

See http://www.microsoft.com/technet/security/bulletin/ms02-045.mspx

Risk factor : High

CVE : CVE-2002-0724
BID : 5556
Other references : OSVDB:2074
Nessus ID : 11110
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host.

Description :

The remote version of Windows contains a flaw in the function
RemoteActivation() in its RPC interface which may allow an attacker to
execute arbitrary code on the remote host with the SYSTEM privileges.

A series of worms (Blaster) are known to exploit this vulnerability in the
wild.

Solution :

http://www.microsoft.com/technet/security/bulletin/MS03-026.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2003-0352
BID : 8205
Other references : IAVA:2003-A-0011, OSVDB:2100
Nessus ID : 11808
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host.

Description :

The remote Windows host has a ASN.1 library which is vulnerable to a
flaw which could allow an attacker to execute arbitrary code on this host.

To exploit this flaw, an attacker would need to send a specially crafted
ASN.1 encoded packet with improperly advertised lengths.

This particular check sent a malformed NTLM packet and determined that
the remote host is not patched.

Solution :

http://www.microsoft.com/technet/security/bulletin/ms04-007.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2003-0818
BID : 9633, 9635, 9743, 13300
Other references : IAVA:2004-A-0001, OSVDB:3902
Nessus ID : 12054
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host due to a flaw in the
LSASS service.

Description :

The remote version of Windows contains a flaw in the function
DsRolerUpgradeDownlevelServer of the Local Security Authority
Server Service (LSASS) which may allow an attacker to execute
arbitrary code on the remote host with the SYSTEM privileges.

A series of worms (Sasser) are known to exploit this vulnerability
in the wild.

Solution :

Microsoft has released a set of patches for Windows NT, 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2003-0533
BID : 10108
Other references : IAVA:2004-A-0006, OSVDB:5248
Nessus ID : 12209
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host.

Description :

The remote host is running a version of Windows which has a flaw in
its RPC interface, which may allow an attacker to execute arbitrary code
and gain SYSTEM privileges.

An attacker or a worm could use it to gain the control of this host.

Note that this is NOT the same bug as the one described in MS03-026
which fixes the flaw exploited by the 'MSBlast' (or LoveSan) worm.

Solution :

http://www.microsoft.com/technet/security/bulletin/MS03-039.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2003-0715, CVE-2003-0528, CVE-2003-0605
BID : 8458, 8460
Other references : IAVA:2003-A-0012, OSVDB:2535, OSVDB:11460, OSVDB:11797
Nessus ID : 11835
Vulnerability microsoft-ds (445/tcp)
Synopsis :

A flaw in the Plug and Play service may allow an authenticated attacker
to execute arbitrary code on the remote host and therefore elevate his
privileges.

Description :

The remote host contain a version of the Plug and Play service which
contains a vulnerability in the way it handles user-supplied data.

An authenticated attacker may exploit this flaw by sending a malformed
RPC request to the remote service and execute code within the SYSTEM
context.

Note: Authentication is not required against Windows 2000 if the patch
MS05-039 is missing.


Solution :

Microsoft has released a set of patches for Windows 2000 and XP :

http://www.microsoft.com/technet/security/bulletin/ms05-047.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2005-2120
BID : 15065
Other references : OSVDB:18830
Nessus ID : 21193
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host due to a flaw in the
Spooler service.

Description :

The remote host contains a version of the Print Spooler service which
is vulnerable to a security flaw which may allow an attacker to execute
code on the remote host or crash the spooler service.

An attacker can execute code on the remote host with a NULL session against :
- Windows 2000

An attacker can crash the remote service with a NULL session against :
- Windows 2000
- Windows XP SP1

An attacker needs valid credentials to crash the service against :
- Windows 2003
- Windows XP SP2

Solution :

Microsoft has released a set of patches for Windows 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms05-043.mspx

Risk factor :

Critical / CVSS Base Score : 10
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2005-1984
BID : 14514
Other references : IAVA:2005-t-0029, OSVDB:18607
Nessus ID : 19407
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host due to a flaw in the
SMB implementation.

Description :

The remote version of Windows contains a flaw in the Server Message
Block (SMB) implementation which may allow an attacker to execute arbitrary
code on the remote host.

An attacker does not need to be authenticated to exploit this flaw.

Solution :

Microsoft has released a set of patches for Windows 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms05-027.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2005-1206
BID : 13942
Other references : IAVA:2005-t-0019, OSVDB:17308
Nessus ID : 18502
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host due to a flaw in the
Plug-And-Play service.

Description :

The remote version of Windows contains a flaw in the function
PNP_QueryResConfList() in the Plug and Play service which may allow an
attacker to execute arbitrary code on the remote host with the SYSTEM
privileges.

A series of worms (Zotob) are known to exploit this vulnerability in the
wild.

Solution :

Microsoft has released a set of patches for Windows 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms05-039.mspx

Risk factor :

Critical / CVSS Base Score : 10
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2005-1983
BID : 14513
Other references : IAVA:2005-A-0025, OSVDB:18605
Nessus ID : 19408
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host due to a flaw in the
'server' service.

Description :

The remote host is vulnerable to a buffer overrun in the 'Server' service
which may allow an attacker to execute arbitrary code on the remote host
with the 'System' privileges.

Solution :

Microsoft has released a set of patches for Windows 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms06-040.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2006-3439
BID : 19409
Nessus ID : 22194
Vulnerability microsoft-ds (445/tcp) Synopsis :

It is possible to crash the remote host due to a flaw in SMB.

Description :

The remote host is vulnerable to memory corruption vulnerability in SMB which
may allow an attacker to execute arbitrary code or perform a denial of service
against the remote host.

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008 :

http://www.microsoft.com/technet/security/bulletin/ms09-001.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2008-4834, CVE-2008-4835, CVE-2008-4114
BID : 31179, 33121, 33122
Nessus ID : 35362
Vulnerability microsoft-ds (445/tcp)
It is possible to anonymously read the event logs of the remote Windows 2000 host by
connecting to the \srvsvc pipe and binding to the event log service.

An attacker may use this flaw to anonymously read the system logs of the remote host.
As system logs typically include valuable information, an attacker may use them to
perform a better attack against the remote host.

Solution : Install the Update Rollup Package 1 (URP1) for Windows 2000 SP4 or
set the value RestrictGuestAccess on the Applications and System logs
Risk factor : High

CVE : CVE-2005-2150
BID : 14093, 14178
Nessus ID : 18602
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host due to a flaw in the
'server' service.

Description :

The remote host is vulnerable to heap overflow in the 'Server' service which
may allow an attacker to execute arbitrary code on the remote host with
the 'System' privileges.

In addition to this, the remote host is also vulnerable to an information
disclosure vulnerability in SMB which may allow an attacker to obtain
portions of the memory of the remote host.


Solution :

Microsoft has released a set of patches for Windows 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms06-035.mspx

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE : CVE-2006-1314, CVE-2006-1315
BID : 18863, 18891
Other references : OSVDB:27154, OSVDB:27155
Nessus ID : 22034
Informational microsoft-ds (445/tcp)
Synopsis :

It is possible to obtain the host SID for the remote host.

Description :

By emulating the call to LsaQueryInformationPolicy(), it was possible
to obtain the host SID (Security Identifier).

The host SID can then be used to get the list of local users.

Risk factor :

None

Plugin output :

The remote host SID value is :
1-5-21-73586283-1454471165-682003330

CVE : CVE-2000-1200
BID : 959
Nessus ID : 10859
Informational microsoft-ds (445/tcp)
Synopsis :

Nessus is not able to access the remote Windows Registry.

Description :

It was not possible to connect to PIPE\winreg on the remote host.

If you intend to use Nessus to perform registry-based checks, the
registry checks will not work because the 'Remote Registry Access'
service (winreg) has been disabled on the remote host or can not be
connected to with the supplied credentials.

Risk factor :

None
Nessus ID : 26917
Informational microsoft-ds (445/tcp) Synopsis :

It is possible to enumerate local users.

Description :

Using the host SID, it is possible to enumerate local users on the
remote Windows system.

Risk factor :

None

Plugin output :

- Administrator (id 500, Administrator account)
- Guest (id 501, Guest account)
- TsInternetUser (id 1000)
- IUSR_TRAINING1 (id 1001)
- IWAM_TRAINING1 (id 1002)

Note that, in addition to the Administrator and Guest accounts, Nessus
has enumerated only those local users with IDs between 1000 and 1200.
To use a different range, edit the scan policy and change the 'Start
UID' and/or 'End UID' preferences for this plugin, then re-run the
scan.

CVE : CVE-2000-1200
BID : 959
Other references : OSVDB:714
Nessus ID : 10860
Informational microsoft-ds (445/tcp)
Synopsis :

It is possible to enumerate remote network shares.

Description :

By connecting to the remote host using a NULL (or guest) session
Nessus was able to enumerate the network share names.

Risk factor :

None

Plugin output :

Here are the SMB shares available on the remote host:

- IPC$
- ADMIN$
- C$

Nessus ID : 10395
Informational microsoft-ds (445/tcp)
Synopsis :

It is possible to retrieve the remote host's password policy using the
supplied credentials.

Description :

Using the supplied credentials it was possible to extract the password
policy for the remote Windows host. The password policy must be
conform to the Informational System Policy.

Risk factor :

None

Plugin output :

The following password policy is defined on the remote host:

Minimum password len: 0
Password history len: 0
Maximum password age (d): 42
Password must meet complexity requirements: Disabled
Minimum password age (d): 0
Forced logoff time (s): Not set
Locked account time (s): 1800
Time between failed logon (s): 1800
Number of invalid logon before locked out (s): 0

Nessus ID : 17651
Informational microsoft-ds (445/tcp)
It was possible to enumerate the list of services running on the remote
host thru a NULL session, by connecting to \srvsvc


Here is the list of services running on the remote host :
Alerter [ Alerter ]
Computer Browser [ Browser ]
Distributed File System [ Dfs ]
DHCP Client [ Dhcp ]
Logical Disk Manager [ dmserver ]
DNS Client [ Dnscache ]
Event Log [ Eventlog ]
COM+ Event System [ EventSystem ]
IIS Admin Service [ IISADMIN ]
Server [ lanmanserver ]
Workstation [ lanmanworkstation ]
License Logging Service [ LicenseService ]
TCP/IP NetBIOS Helper Service [ LmHosts ]
Messenger [ Messenger ]
Distributed Transaction Coordinator [ MSDTC ]
Removable Storage [ NtmsSvc ]
Plug and Play [ PlugPlay ]
IPSEC Policy Agent [ PolicyAgent ]
Protected Storage [ ProtectedStorage ]
Remote Registry Service [ RemoteRegistry ]
Remote Procedure Call (RPC) [ RpcSs ]
Security Accounts Manager [ SamSs ]
Task Scheduler [ Schedule ]
RunAs Service [ seclogon ]
System Event Notification [ SENS ]
Simple Mail Transport Protocol (SMTP) [ SMTPSVC ]
Print Spooler [ Spooler ]
Distributed Link Tracking Client [ TrkWks ]
VMware Tools Service [ VMTools ]
World Wide Web Publishing Service [ W3SVC ]
Windows Management Instrumentation Driver Extensions [ Wmi ]

Solution : Install the Update Rollup Package 1 (URP1) for Windows 2000 SP4
Risk factor : Low

CVE : CVE-2005-2150
BID : 14093, 14177
Nessus ID : 18585
Informational microsoft-ds (445/tcp) Synopsis :

It is possible to log into the remote Windows host with a NULL
session.

Description :

The remote host is running Microsoft Windows, and it was possible to
log into it using a NULL session (ie, with no login or password). An
unauthenticated remote attacker can leverage this issue to get
information about the remote host.

See also :

http://support.microsoft.com/support/kb/articles/Q143/4/74.ASP
http://support.microsoft.com/support/kb/articles/Q246/2/61.ASP

Risk factor :

None

CVE : CVE-2002-1117
BID : 494
Nessus ID : 26920
Informational microsoft-ds (445/tcp) Synopsis :

It is possible to log into the remote host.

Description :

The remote host is running one of the Microsoft Windows operating
systems. It was possible to log into it using one of the following
account :

- NULL session
- Guest account
- Given Credentials

See also :

http://support.microsoft.com/support/kb/articles/Q143/4/74.ASP
http://support.microsoft.com/support/kb/articles/Q246/2/61.ASP

Risk factor :

None

Plugin output :

- NULL sessions are enabled on the remote host

CVE : CVE-1999-0504, CVE-1999-0505, CVE-1999-0506, CVE-2000-0222, CVE-2002-1117, CVE-2005-3595
BID : 494, 990, 11199
Nessus ID : 10394
Informational microsoft-ds (445/tcp)
Synopsis :

It is possible to obtain information about the remote operating
system.

Description :

It is possible to get the remote operating system name and
version (Windows and/or Samba) by sending an authentication
request to port 139 or 445.

Risk factor :

None

Plugin output :

The remote Operating System is : Windows 5.0
The remote native lan manager is : Windows 2000 LAN Manager
The remote SMB Domain Name is : TRAINING1

Nessus ID : 10785
Informational microsoft-ds (445/tcp)
Synopsis :

A file / print sharing service is listening on the remote host.

Description :

The remote service understands the CIFS (Common Internet File System)
or Server Message Block (SMB) protocol, used to provide shared access
to files, printers, etc between nodes on a network.

Risk factor :

None

Plugin output :

A CIFS server is running on this port.

Nessus ID : 11011
Informational microsoft-ds (445/tcp)
Synopsis :

A DCE/RPC service is running on the remote host.

Description :

By sending a Lookup request to the portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing Environment
(DCE) services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port/pipe.

Solution :

N/A

Risk factor :

None

Plugin output :

The following DCERPC services are available remotely :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5a7b91f8-ff00-11d0-a9b2-00c04fb6e6fc, version 1.0
Description : Messenger Service
Windows process : svchost.exe
Annotation : Messenger Service
Type : Remote RPC service
Named pipe : \PIPE\scerpc
Netbios name : \\TRAINING1

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5a7b91f8-ff00-11d0-a9b2-00c04fb6e6fc, version 1.0
Description : Messenger Service
Windows process : svchost.exe
Annotation : Messenger Service
Type : Remote RPC service
Named pipe : \PIPE\ntsvcs
Netbios name : \\TRAINING1

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bfa951d1-2f0e-11d3-bfd1-00c04fa3490a, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\SMTPSVC
Netbios name : \\TRAINING1

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bfa951d1-2f0e-11d3-bfd1-00c04fa3490a, version 1.0
Description : Unknown RPC service
Type : Remote RPC service
Named pipe : \PIPE\INETINFO
Netbios name : \\TRAINING1

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 82ad4280-036b-11cf-972c-00aa006887b0, version 2.0
Description : Internet Information Service (IISAdmin)
Windows process : inetinfo.exe
Type : Remote RPC service
Named pipe : \PIPE\INETINFO
Netbios name : \\TRAINING1

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8cfb5d70-31a4-11cf-a7d8-00805f48a135, version 3.0
Description : Internet Information Service (SMTP)
Windows process : inetinfo.exe
Type : Remote RPC service
Named pipe : \PIPE\INETINFO
Netbios name : \\TRAINING1

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8cfb5d70-31a4-11cf-a7d8-00805f48a135, version 3.0
Description : Internet Information Service (SMTP)
Windows process : inetinfo.exe
Type : Remote RPC service
Named pipe : \PIPE\SMTPSVC
Netbios name : \\TRAINING1

Nessus ID : 10736
Vulnerability epmap (135/tcp)
Synopsis :

Arbitrary code can be executed on the remote host.

Description :

The remote host has multiple bugs in its RPC/DCOM implementation (828741).

An attacker may exploit one of these flaws to execute arbitrary code on the
remote system.

Solution :

Microsoft has released a set of patches for Windows NT, 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms04-012.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2003-0813, CVE-2004-0116, CVE-2003-0807, CVE-2004-0124
BID : 10121, 10123, 10127, 8811
Other references : IAVA:2004-A-0005, OSVDB:5245, OSVDB:5246, OSVDB:5247
Nessus ID : 21655
Informational epmap (135/tcp)
Synopsis :

A DCE/RPC service is running on the remote host.

Description :

By sending a Lookup request to the portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing Environment
(DCE) services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port/pipe.

Solution :

N/A

Risk factor :

None

Plugin output :

The following DCERPC services are available locally :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 5a7b91f8-ff00-11d0-a9b2-00c04fb6e6fc, version 1.0
Description : Messenger Service
Windows process : svchost.exe
Annotation : Messenger Service
Type : Local RPC service
Named pipe : ntsvcs

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bfa951d1-2f0e-11d3-bfd1-00c04fa3490a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : SMTPSVC_LPC

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bfa951d1-2f0e-11d3-bfd1-00c04fa3490a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : INETINFO_LPC

Object UUID : d0233e5c-4a70-407d-8eff-b174206cdec7
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC000001dc.00000001

Object UUID : 31315b11-60d1-4885-87f1-d281ca688101
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC000001dc.00000001

Object UUID : ee4f35ae-7ab1-45fa-9860-1e7f47962176
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC000001dc.00000001

Object UUID : 8195e9c8-5760-4f9d-870f-f9036a5cb5bf
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC000001dc.00000001

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : LRPC00000294.00000001

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : LRPC00000294.00000001

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 82ad4280-036b-11cf-972c-00aa006887b0, version 2.0
Description : Internet Information Service (IISAdmin)
Windows process : inetinfo.exe
Type : Local RPC service
Named pipe : OLE4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 82ad4280-036b-11cf-972c-00aa006887b0, version 2.0
Description : Internet Information Service (IISAdmin)
Windows process : inetinfo.exe
Type : Local RPC service
Named pipe : INETINFO_LPC

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8cfb5d70-31a4-11cf-a7d8-00805f48a135, version 3.0
Description : Internet Information Service (SMTP)
Windows process : inetinfo.exe
Type : Local RPC service
Named pipe : OLE4

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8cfb5d70-31a4-11cf-a7d8-00805f48a135, version 3.0
Description : Internet Information Service (SMTP)
Windows process : inetinfo.exe
Type : Local RPC service
Named pipe : INETINFO_LPC

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 8cfb5d70-31a4-11cf-a7d8-00805f48a135, version 3.0
Description : Internet Information Service (SMTP)
Windows process : inetinfo.exe
Type : Local RPC service
Named pipe : SMTPSVC_LPC

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : bfa951d1-2f0e-11d3-bfd1-00c04fa3490a, version 1.0
Description : Unknown RPC service
Type : Local RPC service
Named pipe : OLE4

Nessus ID : 10736
[ return to top ]


Analysis of Host
Address of Host Port/Service Issue regarding Port
192.168.1.111 general/icmp Security notes found
192.168.1.111 general/udp Security notes found
192.168.1.111 general/tcp Security hole found
192.168.1.111 netbios-ssn (139/tcp) Security notes found
192.168.1.111 netbios-ns (137/udp) Security notes found
192.168.1.111 blackjack (1025/tcp) Security notes found
192.168.1.111 microsoft-ds (445/tcp) Security hole found
192.168.1.111 epmap (135/tcp) Security notes found


Security Issues and Fixes: 192.168.1.111
Type Port Issue and Fix
Informational general/icmp
Synopsis :

It is possible to determine the exact time set on the remote host.

Description :

The remote host answers to an ICMP timestamp request. This allows an
attacker to know the date which is set on your machine.

This may help him to defeat all your time based authentication
protocols.

Solution :

Filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor :

None

Plugin output :

This host returns non-standard timestamps (high bit is set)
The ICMP timestamps might be in little endian format (not in network format)
The difference between the local and remote clocks is -20 seconds.

CVE : CVE-1999-0524
Nessus ID : 10114
Informational general/udp For your information, here is the traceroute from 192.168.1.106 to 192.168.1.111 :
192.168.1.106
192.168.1.111

Nessus ID : 10287
Vulnerability general/tcp Synopsis :

Arbitrary code can be executed on the remote host due to a flaw in the
'server' service.

Description :

The remote host is vulnerable to a buffer overrun in the 'Server'
service which may allow an attacker to execute arbitrary code on the
remote host with the 'System' privileges.

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003,
Vista and 2008 :

http://www.microsoft.com/technet/security/bulletin/ms08-067.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2008-4250
BID : 31874
Other references : OSVDB:49243
Nessus ID : 34477
Informational general/tcp Information about this scan :

Nessus version : 4.0.1
Plugin feed version : 200906301334
Type of plugin feed : HomeFeed (Non-commercial use only)
Scanner IP : 192.168.1.106
Port scanner(s) : nessus_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Optimize the test : yes
CGI scanning : disabled
Web application tests : disabled
Max hosts : 20
Max checks : 4
Recv timeout : 5
Backports : None
Scan Start Date : 2009/7/2 12:33
Scan duration : 49 sec

Nessus ID : 19506
Informational general/tcp
Remote operating system : Microsoft Windows Server 2003 Service Pack 1
Confidence Level : 99
Method : MSRPC


The remote host is running Microsoft Windows Server 2003 Service Pack 1
Nessus ID : 11936
Informational general/tcp 192.168.1.111 resolves as 192-168-1-111.tpgi.com.au.
Nessus ID : 12053
Informational general/tcp
Synopsis :

The manufacturer can be deduced from the Ethernet OUI.

Description :

Each ethernet MAC address starts with a 24-bit 'Organizationally
Unique Identifier'.
These OUI are registered by IEEE.

See also :

http://standards.ieee.org/faqs/OUI.html
http://standards.ieee.org/regauth/oui/index.shtml

Risk factor :

None

Plugin output :

The following card manufacturers were identified :

00:0c:29:e2:36:75 : VMware, Inc.

Nessus ID : 35716
Informational general/tcp Synopsis :

The remote host seems to be a VMware virtual machine.

Description :

According to the MAC address of its network adapter, the remote host
is a VMware virtual machine.

Since it is physically accessible through the network, ensure that its
configuration matches your organization's security policy.

Risk factor :

None
Nessus ID : 20094
Informational general/tcp Synopsis :

The remote service implements TCP timestamps.

Description :

The remote host implements TCP timestamps, as defined by RFC1323.
A side effect of this feature is that the uptime of the remote
host can sometimes be computed.

See also :

http://www.ietf.org/rfc/rfc1323.txt

Risk factor :

None
Nessus ID : 25220
Informational netbios-ssn (139/tcp)
Synopsis :

A file / print sharing service is listening on the remote host.

Description :

The remote service understands the CIFS (Common Internet File System)
or Server Message Block (SMB) protocol, used to provide shared access
to files, printers, etc between nodes on a network.

Risk factor :

None

Plugin output :

An SMB server is running on this port.

Nessus ID : 11011
Informational netbios-ns (137/udp) Synopsis :

It is possible to obtain the network name of the remote host.

Description :

The remote host listens on udp port 137 and replies to NetBIOS nbtscan
requests. By sending a wildcard request it is possible to obtain the
name of the remote system and the name of its domain.

Risk factor :

None

Plugin output :

The following 6 NetBIOS names have been gathered :

WIN2K3 = Computer name
WORKGROUP = Workgroup / Domain name
WIN2K3 = File Server Service
WORKGROUP = Browser Service Elections
WORKGROUP = Master Browser
__MSBROWSE__ = Master Browser

The remote host has the following MAC address on its adapter :
00:0c:29:e2:36:75

Other references : OSVDB:13577Nessus ID : 10150
Informational blackjack (1025/tcp)
Synopsis :

A DCE/RPC service is running on the remote host.

Description :

By sending a Lookup request to the portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing Environment
(DCE) services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port/pipe.

Solution :

N/A

Risk factor :

None

Plugin output :

The following DCERPC services are available on TCP port 1025 :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
TCP Port : 1025
IP : 192.168.1.111

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Remote RPC service
TCP Port : 1025
IP : 192.168.1.111

Nessus ID : 10736
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host due to a flaw in the
'server' service.

Description :

The remote host is vulnerable to heap overflow in the 'Server' service which
may allow an attacker to execute arbitrary code on the remote host with
the 'System' privileges.

In addition to this, the remote host is also vulnerable to an information
disclosure vulnerability in SMB which may allow an attacker to obtain
portions of the memory of the remote host.


Solution :

Microsoft has released a set of patches for Windows 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms06-035.mspx

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE : CVE-2006-1314, CVE-2006-1315
BID : 18863, 18891
Other references : OSVDB:27154, OSVDB:27155
Nessus ID : 22034
Vulnerability microsoft-ds (445/tcp)
Synopsis :

Arbitrary code can be executed on the remote host due to a flaw in the
'server' service.

Description :

The remote host is vulnerable to a buffer overrun in the 'Server' service
which may allow an attacker to execute arbitrary code on the remote host
with the 'System' privileges.

Solution :

Microsoft has released a set of patches for Windows 2000, XP and 2003 :

http://www.microsoft.com/technet/security/bulletin/ms06-040.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2006-3439
BID : 19409
Nessus ID : 22194
Vulnerability microsoft-ds (445/tcp) Synopsis :

It is possible to crash the remote host due to a flaw in SMB.

Description :

The remote host is vulnerable to memory corruption vulnerability in SMB which
may allow an attacker to execute arbitrary code or perform a denial of service
against the remote host.

Solution :

Microsoft has released a set of patches for Windows 2000, XP, 2003, Vista and 2008 :

http://www.microsoft.com/technet/security/bulletin/ms09-001.mspx

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVE : CVE-2008-4834, CVE-2008-4835, CVE-2008-4114
BID : 31179, 33121, 33122
Nessus ID : 35362
Informational microsoft-ds (445/tcp) Synopsis :

It is possible to log into the remote Windows host with a NULL
session.

Description :

The remote host is running Microsoft Windows, and it was possible to
log into it using a NULL session (ie, with no login or password). An
unauthenticated remote attacker can leverage this issue to get
information about the remote host.

See also :

http://support.microsoft.com/support/kb/articles/Q143/4/74.ASP
http://support.microsoft.com/support/kb/articles/Q246/2/61.ASP

Risk factor :

None

CVE : CVE-2002-1117
BID : 494
Nessus ID : 26920
Informational microsoft-ds (445/tcp)
Synopsis :

Nessus is not able to access the remote Windows Registry.

Description :

It was not possible to connect to PIPE\winreg on the remote host.

If you intend to use Nessus to perform registry-based checks, the
registry checks will not work because the 'Remote Registry Access'
service (winreg) has been disabled on the remote host or can not be
connected to with the supplied credentials.

Risk factor :

None
Nessus ID : 26917
Informational microsoft-ds (445/tcp) Synopsis :

It is possible to obtain network information.

Description :

It was possible to obtain the browse list of the remote Windows system
by send a request to the LANMAN pipe. The browse list is the list of
the nearest Windows systems of the remote host.

Risk factor :

None

Plugin output :

Here is the browse list of the remote host :

TRAINING1 ( os : 5.0 )
WIN2K3 ( os : 5.2 )

Other references : OSVDB:300
Nessus ID : 10397
Informational microsoft-ds (445/tcp) Synopsis :

It is possible to log into the remote host.

Description :

The remote host is running one of the Microsoft Windows operating
systems. It was possible to log into it using one of the following
account :

- NULL session
- Guest account
- Given Credentials

See also :

http://support.microsoft.com/support/kb/articles/Q143/4/74.ASP
http://support.microsoft.com/support/kb/articles/Q246/2/61.ASP

Risk factor :

None

Plugin output :

- NULL sessions are enabled on the remote host

CVE : CVE-1999-0504, CVE-1999-0505, CVE-1999-0506, CVE-2000-0222, CVE-2002-1117, CVE-2005-3595
BID : 494, 990, 11199
Nessus ID : 10394
Informational microsoft-ds (445/tcp)
Synopsis :

It is possible to obtain information about the remote operating
system.

Description :

It is possible to get the remote operating system name and
version (Windows and/or Samba) by sending an authentication
request to port 139 or 445.

Risk factor :

None

Plugin output :

The remote Operating System is : Windows Server 2003 3790 Service Pack 1
The remote native lan manager is : Windows Server 2003 5.2
The remote SMB Domain Name is : WIN2K3

Nessus ID : 10785
Informational microsoft-ds (445/tcp)
Synopsis :

A file / print sharing service is listening on the remote host.

Description :

The remote service understands the CIFS (Common Internet File System)
or Server Message Block (SMB) protocol, used to provide shared access
to files, printers, etc between nodes on a network.

Risk factor :

None

Plugin output :

A CIFS server is running on this port.

Nessus ID : 11011
Informational microsoft-ds (445/tcp)
Synopsis :

A DCE/RPC service is running on the remote host.

Description :

By sending a Lookup request to the portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing Environment
(DCE) services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port/pipe.

Solution :

N/A

Risk factor :

None

Plugin output :

The following DCERPC services are available remotely :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN2K3

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN2K3

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Remote RPC service
Named pipe : \PIPE\atsvc
Netbios name : \\WIN2K3

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \PIPE\lsass
Netbios name : \\WIN2K3

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Remote RPC service
Named pipe : \PIPE\protected_storage
Netbios name : \\WIN2K3

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Remote RPC service
Named pipe : \PIPE\lsass
Netbios name : \\WIN2K3

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Remote RPC service
Named pipe : \PIPE\protected_storage
Netbios name : \\WIN2K3

Nessus ID : 10736
Informational epmap (135/tcp)
Synopsis :

A DCE/RPC service is running on the remote host.

Description :

By sending a Lookup request to the portmapper (TCP 135 or epmapper
PIPE) it was possible to enumerate the Distributed Computing Environment
(DCE) services running on the remote port.
Using this information it is possible to connect and bind to
each service by sending an RPC request to the remote port/pipe.

Solution :

N/A

Risk factor :

None

Plugin output :

The following DCERPC services are available locally :

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : dhcpcsvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1.0
Description : DHCP Client Service
Windows process : svchost.exe
Annotation : DHCP Client LRPC Endpoint
Type : Local RPC service
Named pipe : DNSResolver

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLEE1E26C939691435B89A296E2C00E

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 0a74ef1c-41a4-4e06-83ae-dc74fb1cdd53, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : wzcsvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLEE1E26C939691435B89A296E2C00E

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 378e52b0-c0a9-11cf-822d-00aa0051e40f, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : wzcsvc

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : OLEE1E26C939691435B89A296E2C00E

Object UUID : 00608915-68d6-41b3-b63d-fe097e07e125
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC000005a8.00000001

Object UUID : 296b1dc6-31e1-4fb4-8838-282b46f938e1
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC000005a8.00000001

Object UUID : 6dcdd145-c8ac-448b-b4e3-d98c3d2dd62a
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC000005a8.00000001

Object UUID : a75517a7-31ab-4607-9246-124215e305a1
UUID : 906b0ce0-c70b-1067-b317-00dd010662da, version 1.0
Description : Distributed Transaction Coordinator
Windows process : msdtc.exe
Type : Local RPC service
Named pipe : LRPC000005a8.00000001

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345778-1234-abcd-ef00-0123456789ac, version 1.0
Description : Security Account Manager
Windows process : lsass.exe
Type : Local RPC service
Named pipe : dsrole

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Local RPC service
Named pipe : audit

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Local RPC service
Named pipe : securityevent

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Local RPC service
Named pipe : protected_storage

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 12345678-1234-abcd-ef00-0123456789ab, version 1.0
Description : IPsec Services (Windows XP & 2003)
Windows process : lsass.exe
Annotation : IPSec Policy agent endpoint
Type : Local RPC service
Named pipe : dsrole

Object UUID : 00000000-0000-0000-0000-000000000000
UUID : 1ff70682-0a51-30e8-076d-740be8cee98b, version 1.0
Description : Scheduler Service
Windows process : svchost.exe
Type : Local RPC service
Named pipe : wzcsvc

Nessus ID : 10736

This file was generated by Nessus, the security scanner.