Network Vulnerability Assessment Report
25.07.2004
Sorted by host names

Session name: Session1Start Time:25.07.2004 17:21:42
Finish Time:25.07.2004 18:40:10
Elapsed:0 day(s) 01:18:28
Total records generated:4
high severity:1
low severity:2
informational:1


Summary of scanned hosts

HostHolesWarningsOpen portsState
192.168.0.1121Finished


192.168.0.1

ServiceSeverityDescription
isakmp (500/udp)
Info
Port is open
general/udp
High
It was possible to crash the
remote server using the linux 'zero fragment' bug.

An attacker may use this flaw to prevent your
network from working properly.

Solution : if the remote host is a Linux server, then install
a newer kernel (2.2.4). If it is not, then contact your vendor
for a patch.

Risk factor : High
CVE : CAN-1999-0431
BID : 2247
general/icmp
Low

The remote host answers to an ICMP timestamp request. This allows an attacker
to know the date which is set on your machine.

This may help him to defeat all your time based authentication protocols.

Solution : filter out the ICMP timestamp requests (13), and the outgoing ICMP
timestamp replies (14).

Risk factor : Low
CVE : CAN-1999-0524
isakmp (500/udp)
Low
The remote host seems to be enabled to do Internet Key
Exchange (IKE). This is typically indicative of a VPN server.
VPN servers are used to connect remote hosts into internal
resources.

Solution: You should ensure that:
1) The VPN is authorized for your Companies computing environment
2) The VPN utilizes strong encryption
3) The VPN utilizes strong authentication

Risk factor : Low