Network Vulnerability Assessment Report |
| |
Sorted by host names |
| |||||||||
|
Host | Holes | Warnings | Open ports | State |
172.16.0.1 | 1 | 16 | 8 | Finished |
Service | Severity | Description |
unknown (1900/udp) | Port is open | |
ftp (21/tcp) | Port is open | |
ssh (22/tcp) | Port is open | |
telnet (23/tcp) | Port is open | |
http (80/tcp) | Port is open | |
snmp (161/udp) | Port is open | |
https (443/tcp) | Port is open | |
snmp (161/tcp) | Port is open | |
general/tcp | The remote host has predictable TCP sequence numbers. An attacker may use this flaw to establish spoofed TCP connections to this host. Solution : If the remote host is running Windows, see http://www.microsoft.com/technet/security/bulletin/ms99-046.asp Risk factor : High CVE : CVE-1999-0077 | |
ftp (21/tcp) | An FTP server is running on this port. Here is its banner : 220 FTP version 1.0 ready at Sat Jan 01 21:10:03 2000 | |
telnet (23/tcp) | An unknown service is running on this port. It is usually reserved for Telnet | |
snmp (161/tcp) | snmpwalk could get the open port list with the community name 'public' | |
ssh (22/tcp) | An unknown service is running on this port. It is usually reserved for SSH | |
http (80/tcp) | An unknown service is running on this port. It is usually reserved for HTTP | |
ftp (21/tcp) | Remote FTP server banner : 220 FTP version 1.0 ready at Sat Jan 01 21:10:03 2000 | |
ssh (22/tcp) | A SSH server seems to be running on this port | |
general/tcp | Remote OS guess : Netopia R3100-I DSL Router Firmware version v4.7.2 CVE : CAN-1999-0454 | |
ssh (22/tcp) | Remote SSH version : SSH-1.5-1.0.0 | |
ssh (22/tcp) | You are running SSH protocol version 1.5. This version allows a remote attacker to decrypt and/or alter traffic via an attack on PKCS#1 version 1.5 knows as a Bleichenbacher attack. OpenSSH up to version 2.3.0, AppGate, and SSH Communications Security ssh-1 up to version 1.2.31 have the vulnerability present, although it may not be exploitable due to configurations. Solution : Patch and New version are available from SSH/OpenSSH. Risk factor : Low CVE : CVE-2001-0361 BID : 2344 | |
ssh (22/tcp) | You are running a version of SSH which is older than (or as old as) version 1.2.27. If you compiled ssh with kerberos support, then an attacker may eavesdrop your users kerberos tickets, as sshd will set the environment variable KRB5CCNAME to 'none', so kerberos tickets will be stored in the current working directory of the user, as 'none'. If you have nfs/smb shared disks, then an attacker may eavesdrop the kerberos tickets of your users using this flaw. *** If you are not using kerberos, then *** ignore this warning. Risk factor : Serious Solution : use ssh 1.2.28 or newer CVE : CVE-2000-0575 BID : 1426 | |
http (80/tcp) | The remote web server type is : RomPager/4.07 UPnP/1.0 Solution : We recommend that you configure (if possible) your web server to return a bogus Server header in order to not leak information. | |
https (443/tcp) | An unknown service is running on this port. It is usually reserved for HTTPS | |
general/udp | For your information, here is the traceroute to 172.16.0.1 : 172.16.0.1 | |
ssh (22/tcp) | You are running SSH Communications Security SSH 1.2.30, or previous. This version does not log repeated login attempts, which could allow remote attackers to compromise accounts without detection via a brute force attack. Solution : Patch and New version are available from SSH. Risk factor : High CVE : CAN-2001-0471 BID : 2345 | |
telnet (23/tcp) | Remote telnet banner : Password: |