Security Issues and Fixes: 192.168.1.107 |
Type |
Port |
Issue and Fix |
Warning |
ssh (22/tcp) |
Overview: The host is installed with OpenSSH and is prone to information
disclosure vulnerability.
Vulnerability Insight:
The flaw is caused due to the improper handling of errors within an SSH session
encrypted with a block cipher algorithm in the Cipher-Block Chaining 'CBC' mode.
Impact:
Successful exploits will allow attackers to obtain four bytes of plaintext from
an encrypted session.
Impact Level: Application
Affected Software/OS:
Versions prior to OpenSSH 5.2 are vulnerable. Various versions of SSH Tectia
are also affected.
Fix: Upgrade to higher version
http://www.openssh.com/portable.html
References:
http://www.securityfocus.com/bid/32319
Risk factor: Medium
BID : 32319
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.100153 |
Informational |
ssh (22/tcp) |
An ssh server is running on this port
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10330 |
Informational |
ssh (22/tcp) |
No key given for SLAD checks. SLAD checks will be disabled.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90002 |
Informational |
ssh (22/tcp) |
Remote SSH version : SSH-2.0-OpenSSH_4.3
Remote SSH supported authentication : publickey,gssapi-with-mic,password
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10267 |
Informational |
ssh (22/tcp) |
No key given for SLAD checks. SLAD checks will be disabled.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90003 |
Informational |
sunrpc (111/tcp) |
RPC program #100000 version 2 'portmapper' (portmap sunrpc rpcbind) is running on this port
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11111 |
Informational |
unknown (941/tcp) |
RPC program #100024 version 1 'status' is running on this port
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11111 |
Informational |
sunrpc (111/udp) |
RPC program #100000 version 2 'portmapper' (portmap sunrpc rpcbind) is running on this port
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11111 |
Informational |
unknown (938/udp) |
RPC program #100024 version 1 'status' is running on this port
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11111 |
Informational |
general/tcp |
ICMP based OS fingerprint results:
Linux Kernel 2.6.11 (accuracy 91%)
Linux Kernel 2.6.10 (accuracy 91%)
Linux Kernel 2.6.9 (accuracy 91%)
Linux Kernel 2.6.8 (accuracy 91%)
Linux Kernel 2.6.7 (accuracy 91%)
Linux Kernel 2.6.6 (accuracy 91%)
Linux Kernel 2.6.5 (accuracy 91%)
Linux Kernel 2.6.4 (accuracy 91%)
Linux Kernel 2.6.3 (accuracy 91%)
Linux Kernel 2.6.2 (accuracy 91%)
Linux Kernel 2.6.1 (accuracy 91%)
Linux Kernel 2.6.0 (accuracy 91%)
Linux Kernel 2.4.30 (accuracy 91%)
Linux Kernel 2.4.29 (accuracy 91%)
Linux Kernel 2.4.28 (accuracy 91%)
Linux Kernel 2.4.27 (accuracy 91%)
Linux Kernel 2.4.26 (accuracy 91%)
Linux Kernel 2.4.25 (accuracy 91%)
Linux Kernel 2.4.24 (accuracy 91%)
Linux Kernel 2.4.23 (accuracy 91%)
Linux Kernel 2.4.22 (accuracy 91%)
Linux Kernel 2.4.21 (accuracy 91%)
Linux Kernel 2.4.20 (accuracy 91%)
Linux Kernel 2.4.19 (accuracy 91%)
Linux Kernel 2.0.36 (accuracy 91%)
Linux Kernel 2.0.34 (accuracy 91%)
Linux Kernel 2.0.30 (accuracy 91%)
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.102002 |
Informational |
general/tcp |
Synopsis :
The remote service implements TCP timestamps.
Description :
The remote host implements TCP timestamps, as defined by RFC1323.
A side effect of this feature is that the uptime of the remote
host can sometimes be computed.
See also :
http://www.ietf.org/rfc/rfc1323.txt
Risk factor :
None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.80091 |
Informational |
general/tcp |
Information about this scan :
OpenVAS version : 2.0.1
Plugin feed version : 200906251300
Type of plugin feed : OpenVAS NVT Feed
Scanner IP : 192.168.1.106
Port scanner(s) : openvas_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 20
Max checks : 4
Scan duration : unknown (ping_host.nasl not launched?)
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.19506 |