OpenVAS Scan Report
This report gives details on hosts that were tested and issues that were found. Please follow the recommended steps and procedures to eradicate these threats.

Scan Details
Hosts which were alive and responding during test 1
Number of security holes found 0
Number of security warnings found 1
Number of security notes found 12
Number of false positives found 0


Host List
Host(s) Possible Issue
192.168.1.109 Security warning(s) found
[ return to top ]


Analysis of Host
Address of Host Port/Service Issue regarding Port
192.168.1.109 ssh (22/tcp) Security warning(s) found
192.168.1.109 sunrpc (111/tcp) Security note(s) found
192.168.1.109 x11 (6000/tcp) Security note(s) found
192.168.1.109 unknown (961/tcp) Security note(s) found
192.168.1.109 sunrpc (111/udp) Security note(s) found
192.168.1.109 unknown (958/udp) Security note(s) found
192.168.1.109 general/SMBClient No Information
192.168.1.109 general/tcp Security note(s) found


Security Issues and Fixes: 192.168.1.109
Type Port Issue and Fix
Warning ssh (22/tcp)

Overview: The host is installed with OpenSSH and is prone to information
disclosure vulnerability.

Vulnerability Insight:
The flaw is caused due to the improper handling of errors within an SSH session
encrypted with a block cipher algorithm in the Cipher-Block Chaining 'CBC' mode.

Impact:
Successful exploits will allow attackers to obtain four bytes of plaintext from
an encrypted session.

Impact Level: Application

Affected Software/OS:
Versions prior to OpenSSH 5.2 are vulnerable. Various versions of SSH Tectia
are also affected.

Fix: Upgrade to higher version
http://www.openssh.com/portable.html

References:
http://www.securityfocus.com/bid/32319

Risk factor: Medium
BID : 32319
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.100153
Informational ssh (22/tcp) An ssh server is running on this port
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10330
Informational ssh (22/tcp) No key given for SLAD checks. SLAD checks will be disabled.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90002
Informational ssh (22/tcp) Remote SSH version : SSH-1.99-OpenSSH_3.9p1

Remote SSH supported authentication : publickey,gssapi-with-mic,password


OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10267
Informational ssh (22/tcp) No key given for SLAD checks. SLAD checks will be disabled.
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.90003
Informational sunrpc (111/tcp) RPC program #100000 version 2 'portmapper' (portmap sunrpc rpcbind) is running on this port

OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11111
Informational x11 (6000/tcp) This X server does *not* allow any client to connect to it
however it is recommended that you filter incoming connections
to this port as attacker may send garbage data and slow down
your X session or even kill the server.

Here is the server version : 11.0
Here is the message we received : No protocol specified


Solution : filter incoming connections to ports 6000-6009
Risk factor : Low
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.10407
Informational unknown (961/tcp) RPC program #100024 version 1 'status' is running on this port

OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11111
Informational sunrpc (111/udp) RPC program #100000 version 2 'portmapper' (portmap sunrpc rpcbind) is running on this port

OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11111
Informational unknown (958/udp) RPC program #100024 version 1 'status' is running on this port

OpenVAS ID : 1.3.6.1.4.1.25623.1.0.11111
Informational general/tcp ICMP based OS fingerprint results:

Linux Kernel 2.6.11 (accuracy 91%)
Linux Kernel 2.6.10 (accuracy 91%)
Linux Kernel 2.6.9 (accuracy 91%)
Linux Kernel 2.6.8 (accuracy 91%)
Linux Kernel 2.6.7 (accuracy 91%)
Linux Kernel 2.6.6 (accuracy 91%)
Linux Kernel 2.6.5 (accuracy 91%)
Linux Kernel 2.6.4 (accuracy 91%)
Linux Kernel 2.6.3 (accuracy 91%)
Linux Kernel 2.6.2 (accuracy 91%)
Linux Kernel 2.6.1 (accuracy 91%)
Linux Kernel 2.6.0 (accuracy 91%)
Linux Kernel 2.4.30 (accuracy 91%)
Linux Kernel 2.4.29 (accuracy 91%)
Linux Kernel 2.4.28 (accuracy 91%)
Linux Kernel 2.4.27 (accuracy 91%)
Linux Kernel 2.4.26 (accuracy 91%)
Linux Kernel 2.4.25 (accuracy 91%)
Linux Kernel 2.4.24 (accuracy 91%)
Linux Kernel 2.4.23 (accuracy 91%)
Linux Kernel 2.4.22 (accuracy 91%)
Linux Kernel 2.4.21 (accuracy 91%)
Linux Kernel 2.4.20 (accuracy 91%)
Linux Kernel 2.4.19 (accuracy 91%)
Linux Kernel 2.0.36 (accuracy 91%)
Linux Kernel 2.0.34 (accuracy 91%)
Linux Kernel 2.0.30 (accuracy 91%)


OpenVAS ID : 1.3.6.1.4.1.25623.1.0.102002
Informational general/tcp
Synopsis :

The remote service implements TCP timestamps.

Description :

The remote host implements TCP timestamps, as defined by RFC1323.
A side effect of this feature is that the uptime of the remote
host can sometimes be computed.

See also :

http://www.ietf.org/rfc/rfc1323.txt

Risk factor :

None
OpenVAS ID : 1.3.6.1.4.1.25623.1.0.80091
Informational general/tcp Information about this scan :

OpenVAS version : 2.0.1
Plugin feed version : 200906251300
Type of plugin feed : OpenVAS NVT Feed
Scanner IP : 192.168.1.106
Port scanner(s) : openvas_tcp_scanner
Port range : default
Thorough tests : no
Experimental tests : no
Paranoia level : 1
Report Verbosity : 1
Safe checks : yes
Max hosts : 20
Max checks : 4
Scan duration : unknown (ping_host.nasl not launched?)

OpenVAS ID : 1.3.6.1.4.1.25623.1.0.19506

This file was generated by the OpenVAS security scanner.